Steganography Tool for JPG Images
☆67May 10, 2026Updated last week
Alternatives and similar repositories for jdvrif
Users that are interested in jdvrif are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆138May 7, 2025Updated last year
- Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windows☆34Apr 20, 2026Updated last month
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 7 months ago
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 3 months ago
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆78Sep 1, 2025Updated 8 months ago
- PermCheck is a little tool that checks if the files in a PHP project have the executable bit set properly.☆11May 14, 2026Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated 3 weeks ago
- one-stop resource for all things offensive security.☆179Apr 21, 2026Updated last month
- Red Kite, the Extensible Attack Surface Management tool.☆91Feb 8, 2026Updated 3 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆81Feb 7, 2026Updated 3 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 4 months ago
- intuitive declarative dotfile management☆15Sep 21, 2025Updated 8 months ago
- TuxTape is a DIY toolkit for creating, building, and deploying livepatches for the Linux kernel.☆67May 19, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- A Powerful Network Reconnaissance Tool for Security Professionals☆107Dec 29, 2024Updated last year
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.☆36Jan 4, 2026Updated 4 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- Protect against subdomain takeover☆95Apr 26, 2026Updated 3 weeks ago
- Protection against HTML smuggling attacks.☆102Jul 10, 2025Updated 10 months ago
- ☆17Apr 7, 2025Updated last year
- API Security Vulnerability Scanner designed to help you secure your APIs.☆265Updated this week
- A fast, easy-to-use, and secure command-line tool for encrypting and decrypting files or entire directory trees.☆60Apr 27, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is a bash written script to align stdoutput to terminal center☆19Jun 4, 2024Updated last year
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing☆138May 14, 2026Updated last week
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- TensorFlow code for our ECCV'24 Workshop paper "LightAvatar: Efficient Head Avatar as Dynamic NeLF"☆31Nov 7, 2024Updated last year
- Rotating 3d cube in terminal☆21Jun 21, 2025Updated 11 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆88May 13, 2024Updated 2 years ago
- Customized CVE FEED Notifier☆113Apr 22, 2025Updated last year
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆163Nov 21, 2024Updated last year
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆71Apr 30, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Identify and extract files from container formats using unblob.☆27Nov 19, 2024Updated last year
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- Static Code Analysis for security teams with Inter file taint analysis. Built for finding vulnerabilities, advanced structural search, de…☆131May 12, 2026Updated last week
- A modular exploitation framework extensible with Lua☆66Apr 5, 2026Updated last month
- Proof-of-concept modular implant platform leveraging v8