b3dk7 / atomicjpegLinks
Photo forensics tool that detects alteration of JPEG images
☆10Updated 4 years ago
Alternatives and similar repositories for atomicjpeg
Users that are interested in atomicjpeg are comparing it to the libraries listed below
Sorting:
- Framework for static and dynamic analysis in Android APKs☆32Updated 8 years ago
- Mobile Incident Response Book☆61Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆55Updated 8 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 7 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Updated 8 years ago
- Parallel APK analyzer☆51Updated 9 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Updated 8 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Updated 10 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Memory inspection REPL interface☆45Updated 8 years ago
- A scoreboard for Security CTF events☆37Updated 13 years ago
- ☆14Updated 5 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Updated 8 years ago
- A tool to download malwares☆16Updated 2 years ago
- A GUI-based USB device fuzzer☆64Updated 8 years ago
- API to use Cymru services☆27Updated 12 years ago
- A collection of publicly released whitepapers☆49Updated 8 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 12 years ago
- Memory forensics of virtualization environments☆48Updated 11 years ago
- Find useful stuff in pastebin☆23Updated 12 years ago
- ☆16Updated 11 years ago
- Code for the DIMVA 2018 paper: "MemScrimper: Time- and Space-Efficient Storage of Malware Sandbox Memory Dumps"☆26Updated 6 years ago
- POLAR☆74Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 12 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- SSLMap - TLS/SSL cipher suite scanner.☆64Updated 6 years ago
- Some yara rules and tools☆16Updated 11 years ago
- Scripts created by MRG Effitas☆42Updated 9 years ago