Photo forensics tool that detects alteration of JPEG images
☆10May 13, 2021Updated 4 years ago
Alternatives and similar repositories for atomicjpeg
Users that are interested in atomicjpeg are comparing it to the libraries listed below
Sorting:
- CVE & others☆19Aug 14, 2018Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- A JPEG Error Level Analysis forensic plugin for the GNU Image Manipulation Program (GIMP)☆73Oct 2, 2018Updated 7 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- Typed wrapper over axios☆14Nov 14, 2023Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 5 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Script to install the latest stable ntopng from the official ntop repo, onto a Security Onion 14.04 or 16.04 sensor☆10Jan 27, 2021Updated 5 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Build your own complete XNU kernel header set, replaces Kernel.framework. Gain access to kernel private structures and symbols etc with I…☆11Jun 21, 2018Updated 7 years ago
- GDB scripts☆14Nov 30, 2012Updated 13 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- Examples of programs written in several languages☆11Apr 18, 2023Updated 2 years ago
- Whale FM archive, data☆16Mar 4, 2015Updated 10 years ago
- A kernel module that lists all current tasks in a Linux system☆15Dec 13, 2015Updated 10 years ago
- 2of5☆15Sep 14, 2016Updated 9 years ago
- An anti DDoS tool that tries to neutralize proxies denial of service. Created in 2016.☆10Oct 2, 2016Updated 9 years ago
- Assembly/Shellcode☆14Oct 28, 2014Updated 11 years ago
- Tool for decrypting files encrypted by the SynoLocker ransomware☆15Aug 22, 2014Updated 11 years ago
- Portable C Compiler (CVS mirror)☆12Apr 9, 2012Updated 13 years ago
- Error Level Analysis (ELA) in ImageJ☆10Oct 17, 2019Updated 6 years ago
- Tool used for converting Linux Kernel time jiffies, from iptables xt_recent timestamps, to human datetime☆13Feb 16, 2021Updated 5 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 6 years ago
- A set of tools to work with cgroup tree and process classification/QoS according to it☆10Oct 1, 2019Updated 6 years ago
- Git repository to browse the XNU releases from☆10Sep 20, 2021Updated 4 years ago
- ☆16Jul 21, 2018Updated 7 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- The NowSecure Mobile Security Report☆11Nov 16, 2016Updated 9 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Turn your Raspberry Pi into router☆26Mar 29, 2014Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- Basic networking components for Wonderland Engine based off of peer.js☆13May 8, 2024Updated last year