Steganography Tool for JPG Images
☆65Apr 1, 2026Updated last week
Alternatives and similar repositories for jdvrif
Users that are interested in jdvrif are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Steganography Tool for PNG Images☆19Mar 31, 2026Updated last week
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆138May 7, 2025Updated 11 months ago
- Store and retrieve encrypted secrets with PowerShell on Windows, Linux, or MacOS and also from KeePass 2 databases on Windows☆34Mar 4, 2026Updated last month
- A How-To Guide on using Security Commands and Observing Network Traffic on Wireshark☆18Jan 27, 2026Updated 2 months ago
- 📡 802.11 broadcast analyzer & injector☆174Jun 17, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Multilingual library made for validation, various form fields, such as: email, telephone, password, cpf, cnpj, credit card, magic numbers…☆19Feb 15, 2025Updated last year
- Identify hardcoded secrets in static structured text (version 2)☆99Feb 5, 2025Updated last year
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated 2 months ago
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Extension for visual studio code for developing kickass assm c64 programs☆10Mar 26, 2023Updated 3 years ago
- one-stop resource for all things offensive security.☆179Feb 21, 2026Updated last month
- A cybersecurity tool designed to safeguard against IDN Homograph Attacks☆46Aug 5, 2025Updated 8 months ago
- 💎 Article reader for your terminal☆14Sep 17, 2023Updated 2 years ago
- CLI to prevent malicious Terraform Providers from being executed. You can define the allow list of Terraform Providers and their versions…☆88Updated this week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Cinematic ANSI banners for Rust CLI/TUI.☆68Dec 24, 2025Updated 3 months ago
- Red Kite, the Extensible Attack Surface Management tool.☆89Feb 8, 2026Updated 2 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆79Feb 7, 2026Updated 2 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 3 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 4 months ago
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Mar 12, 2024Updated 2 years ago
- intuitive declarative dotfile management☆15Sep 21, 2025Updated 6 months ago
- ☆31Aug 13, 2025Updated 7 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆73Mar 1, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Protection against HTML smuggling attacks.☆101Jul 10, 2025Updated 9 months ago
- This is a bash written script to align stdoutput to terminal center☆19Jun 4, 2024Updated last year
- Ephemeral, zero-knowledge, end-to-end post-quantum encrypted sensitive data sharing☆136Feb 12, 2026Updated last month
- YouShallNotPass brings an added level of execution security to mission-critical CI/CD Systems.☆37Jan 1, 2024Updated 2 years ago
- TensorFlow code for our ECCV'24 Workshop paper "LightAvatar: Efficient Head Avatar as Dynamic NeLF"☆30Nov 7, 2024Updated last year
- A web fuzzer using the httpipe format☆98Mar 29, 2024Updated 2 years ago
- Metal GPU implementation of the Qwen3 transformer model on macOS with complete Apple Silicon compute shader acceleration.☆42Oct 6, 2025Updated 6 months ago
- Control a system remotely via telegram in Powershell☆14Mar 28, 2025Updated last year
- Hastly written Tools & Scripts for Personal Use Cases & Bug Bounties☆81Mar 6, 2025Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Gameboy emulator running in a PDF file (inspired by DoomPDF)☆29Apr 22, 2025Updated 11 months ago
- Customized CVE FEED Notifier☆113Apr 22, 2025Updated 11 months ago
- PWN is an open security automation framework that aims to stand on the shoulders of security giants, promoting trust and innovation.☆70Mar 27, 2026Updated 2 weeks ago
- Burp Extender to add unique form tokens to scanner requests.☆13Nov 5, 2024Updated last year
- Protect your SIP Servers from bad actors at https://sentrypeer.org☆207Apr 3, 2026Updated last week
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆173Mar 29, 2026Updated last week