Steganography Tool for JPG Images
☆65Apr 24, 2026Updated last week
Alternatives and similar repositories for jdvrif
Users that are interested in jdvrif are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steganography Tool for PNG Images☆19Apr 24, 2026Updated last week
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆138May 7, 2025Updated 11 months ago
- Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windows☆34Apr 20, 2026Updated last week
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 📡 802.11 broadcast analyzer & injector☆174Jun 17, 2025Updated 10 months ago
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sub…☆87Feb 14, 2026Updated 2 months ago
- PermCheck is a little tool that checks if the files in a PHP project have the executable bit set properly.☆11Apr 21, 2026Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 3 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆361Updated this week
- Extension for visual studio code for developing kickass assm c64 programs☆10Mar 26, 2023Updated 3 years ago
- Run multiple commands in parallel with clean stdout/stderr output☆16Jul 5, 2023Updated 2 years ago
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆47Aug 5, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated this week
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated 2 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆30Nov 26, 2025Updated 5 months ago
- Offline Cybersecurity Knowledge Base☆208Mar 24, 2026Updated last month
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- ☆31Aug 13, 2025Updated 8 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 3 months ago
- API Security Vulnerability Scanner designed to help you secure your APIs.☆262Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a bash written script to align stdoutput to terminal center☆19Jun 4, 2024Updated last year
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing☆137Apr 15, 2026Updated 2 weeks ago
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- Execute invisible JavaScript by abusing Hangul filler characters. Inspired by Martin Kleppe's INVISIBLE.js.☆18Oct 13, 2024Updated last year
- TensorFlow code for our ECCV'24 Workshop paper "LightAvatar: Efficient Head Avatar as Dynamic NeLF"☆31Nov 7, 2024Updated last year
- Rotating 3d cube in terminal☆21Jun 21, 2025Updated 10 months ago
- A web fuzzer using the httpipe format☆98Mar 29, 2024Updated 2 years ago
- Metal GPU implementation of the Qwen3 transformer model on macOS with complete Apple Silicon compute shader acceleration.☆44Oct 6, 2025Updated 6 months ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆88May 13, 2024Updated last year
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆80Mar 6, 2025Updated last year
- Customized CVE FEED Notifier☆112Apr 22, 2025Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆163Nov 21, 2024Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆70Apr 23, 2026Updated last week
- Binary Deobfuscation Series☆21Nov 20, 2019Updated 6 years ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year