¿Sospechas que un archivo podría contener información oculta o maliciosa? Ésta herramienta de análisis avanzado escanea PDFs, documentos de Office (Word, Excel, PowerPoint), imágenes, archivos ZIP y más para descubrir contenido oculto, metadatos comprometedores, macros maliciosas o incluso steganografía (datos camuflados).
☆21Apr 2, 2025Updated 11 months ago
Alternatives and similar repositories for StegAnalyzer
Users that are interested in StegAnalyzer are comparing it to the libraries listed below
Sorting:
- Herramienta para hacking wifi con múltiples opciones.☆44Aug 12, 2024Updated last year
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 10 months ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Dec 30, 2024Updated last year
- X-snifer is a versatile tool designed for scanning and gathering information from a website and simplifying various website analysis and …☆84Oct 16, 2025Updated 5 months ago
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆16Feb 27, 2025Updated last year
- ☆13Feb 25, 2026Updated 3 weeks ago
- Source for AT&T UNIX System V/386 Release 4 Version 3.0☆17Aug 19, 2024Updated last year
- Command generator for pentesting tools☆17Dec 2, 2024Updated last year
- Acunetix - Vulnerability Scanner install + licensed (included docker version)☆13Jul 23, 2025Updated 7 months ago
- UNIX pacman game by Dave Nixon, AGS Computers Inc. (1981) with curses support by Mark Horton (1982)☆17Jul 20, 2022Updated 3 years ago
- BlackRecon is an automated reconnaissance tool designed for ethical hacking and security assessments. It enumerates subdomains, resolves …☆20Apr 27, 2025Updated 10 months ago
- FTP-AnonHunter is a Python tool designed to automate the discovery of anonymous open FTP servers. Using Nmap’s ftp-anon script, the tool …☆10Oct 16, 2024Updated last year
- Snyk Visual Studio Extension☆38Updated this week
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆46Oct 26, 2025Updated 4 months ago
- A Toolbox Platform for Creating Your Own Tools. Bake Them with Code or AI.☆23Feb 22, 2026Updated last month
- Datasets for cybersecurity☆16Aug 12, 2025Updated 7 months ago
- Este script es una herramienta avanzada diseñada para administrar, crear y personalizar máquinas virtuales en entornos Docker, especialme…☆17Feb 2, 2025Updated last year
- Web Scraper is a melange of Web tools for web hacking, reconnaissance, bug bounty so on. This tool consists of 20 most used web tools for…☆33Feb 16, 2026Updated last month
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Aug 13, 2024Updated last year
- Boilerplate Removal and Fulltext Extraction from HTML pages for Android☆18Jun 17, 2014Updated 11 years ago
- A simple Intel 8085-based computer design☆21Nov 17, 2023Updated 2 years ago
- Traceability in blockchain (ethereum and binance for now)☆19Nov 9, 2024Updated last year
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆28Feb 4, 2026Updated last month
- micropython code with lvgl widgets☆19Nov 4, 2025Updated 4 months ago
- Herramienta de BugBounty atutomatizada☆42Feb 27, 2026Updated 3 weeks ago
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- ☆22Jul 2, 2025Updated 8 months ago
- Reverse engineering UI for Frida and Android☆16Oct 10, 2023Updated 2 years ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆27Aug 12, 2024Updated last year
- reverse shell, Bypass windows defender firewall☆45Nov 13, 2024Updated last year
- ☆20Sep 2, 2021Updated 4 years ago
- Plataforma de CTI Assíncrona focada em Crimes Financeiros (Pix/Cripto) e Compliance Regulatório (Lei 14.790). Powered by LangGraph & Asyn…☆40Jan 14, 2026Updated 2 months ago
- Automation for GoPhish internal phishing campaigns.☆20Jan 24, 2022Updated 4 years ago
- 🦝 Herramienta de anonimato extremo para Kali Linux. Cambia MAC, VPN, Tor, DNS, Restablece y limpia logs.☆59Apr 14, 2025Updated 11 months ago
- Cisco SmartInstall Exploit [CVE-2018-0171]☆18Feb 6, 2023Updated 3 years ago
- Curso de Introducción a la Inteligencia Artificial Generativa con Modelos de Gran Tamaño☆25May 26, 2025Updated 9 months ago
- MAES: M365 Analyzer & Extractor Suite Po☆33Feb 14, 2026Updated last month
- [VISAPP 2022] MdVRNet: Deep Video Restoration under Multiple Distortions☆12Aug 7, 2024Updated last year