¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos de Office (Word, Excel, PowerPoint), imágenes, archivos ZIP y más para descubrir contenido oculto, metadatos comprometedores, macros maliciosas o incluso steganografía (datos camuflados).
☆22Apr 2, 2025Updated last year
Alternatives and similar repositories for StegAnalyzer
Users that are interested in StegAnalyzer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Herramienta para hacking wifi con múltiples opciones.☆49Aug 12, 2024Updated last year
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated last year
- ☆10Apr 7, 2025Updated last year
- Comprehensive notes and resources to ace the eLearnSecurity Junior Penetration Testing certificate, helping you master the art of ethical…☆14Nov 27, 2023Updated 2 years ago
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆89Oct 16, 2025Updated 7 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- UNIX pacman game by Dave Nixon, AGS Computers Inc. (1981) with curses support by Mark Horton (1982)☆17Jul 20, 2022Updated 3 years ago
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆22Apr 27, 2025Updated last year
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆14Jul 23, 2025Updated 9 months ago
- Source for AT&T UNIX System V/386 Release 4 Version 3.0☆18Aug 19, 2024Updated last year
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 6 months ago
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆47Oct 26, 2025Updated 6 months ago
- A Toolbox Platform for Creating Your Own Tools. Bake Them with Code or AI.☆24Feb 22, 2026Updated 2 months ago
- Datasets for cybersecurity☆18Aug 12, 2025Updated 9 months ago
- Este script es una herramienta avanzada diseñada para administrar, crear y personalizar máquinas virtuales en entornos Docker, especialme…☆16Feb 2, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Web Scraper is a melange of Web tools for web hacking, reconnaissance, bug bounty so on. This tool consists of 20 most used web tools for…☆34Feb 16, 2026Updated 3 months ago
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆33Aug 13, 2024Updated last year
- A simple Intel 8085-based computer design☆21Nov 17, 2023Updated 2 years ago
- Traceability in blockchain (ethereum and binance for now)☆19Nov 9, 2024Updated last year
- Proyectos prácticos de Machine Learning en Python y R. Incluye análisis de datos reales, visualizaciones, modelos predictivos y técnicas …☆22May 4, 2026Updated 2 weeks ago
- CyberPreacher cloud project collection☆16Dec 21, 2025Updated 5 months ago
- Watch a file and send new lines to Logflare.☆25Feb 7, 2023Updated 3 years ago
- Herramienta de BugBounty atutomatizada☆44Mar 25, 2026Updated last month
- A maven based java project☆12Mar 20, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- micropython code with lvgl widgets☆20Nov 4, 2025Updated 6 months ago
- ☆12Mar 31, 2023Updated 3 years ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Aug 12, 2024Updated last year
- Conjunto de PPTS y PDFs acerca de Angular para que todos tengan acceso☆17Jul 1, 2024Updated last year
- reverse shell, Bypass windows defender firewall☆45Nov 13, 2024Updated last year
- Web GUI tool to make configuring and deploying multiple VyOS routers easier☆16Apr 19, 2025Updated last year
- A simple, easy to use and extendible JSON database.☆18Apr 24, 2023Updated 3 years ago
- Plataforma de CTI Assíncrona focada em Crimes Financeiros (Pix/Cripto) e Compliance Regulatório (Lei 14.790). Powered by LangGraph & Asyn…☆41Jan 14, 2026Updated 4 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆20Sep 2, 2021Updated 4 years ago
- Automation for GoPhish internal phishing campaigns.☆20Jan 24, 2022Updated 4 years ago
- ☆29Dec 5, 2025Updated 5 months ago
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆35Apr 21, 2026Updated last month
- Modern graphing calculator operating system.☆27Aug 2, 2020Updated 5 years ago
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆58Apr 14, 2025Updated last year
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago