ccyl13 / StegAnalyzerLinks
¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos de Office (Word, Excel, PowerPoint), imágenes, archivos ZIP y más para descubrir contenido oculto, metadatos comprometedores, macros maliciosas o incluso steganografía (datos camuflados).
☆21Updated 10 months ago
Alternatives and similar repositories for StegAnalyzer
Users that are interested in StegAnalyzer are comparing it to the libraries listed below
Sorting:
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Updated 3 months ago
- OriON is a virtual machine in Spanish that incorporates several tools for Open Source Intelligence (OSINT) on people.☆174Updated 2 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Updated last year
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Updated last year
- wp-config-scan☆81Updated 2 years ago
- Este script es una herramienta avanzada diseñada para administrar, crear y personalizar máquinas virtuales en entornos Docker, especialme…☆17Updated last year
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆19Updated 9 months ago
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆58Updated 9 months ago
- A comprehensive automation script for penetration testing and reconnaissance.☆43Updated last year
- Red Team Scaner☆55Updated 2 months ago
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆34Updated last year
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆83Updated 3 months ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆32Updated 11 months ago
- ☆27Updated last year
- Msfvenom Advanced Obfuscated Payload Builder.☆32Updated 8 months ago
- Professional AI Hacking Platform☆59Updated 3 months ago
- DPULSE - Tool for complex approach to domain OSINT☆158Updated 3 weeks ago
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆23Updated 4 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆170Updated 10 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆97Updated 2 weeks ago
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆220Updated 5 months ago
- A web based OSINT ressource and tool☆183Updated 10 months ago
- OSINT tool to crawl a site and extract useful recon info.☆453Updated 5 months ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated last year
- Herramienta para hacking wifi con múltiples opciones.☆44Updated last year
- Algunos #OSINT_TIPS para sus excelentes investigaciones en fuentes abiertas (#OSINT). Hello! I share some #OSINT_TIPS for your excellent …☆26Updated 2 years ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16Updated 8 months ago
- Information Gatherer & Webapps Exploiter☆208Updated last year
- DaProfiler is an OSINT tool allowing you to collect certain information about yourself in order to rectify by rgpd requests the traces yo…☆195Updated 2 years ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year