daniellerch / hstegoLinks
Hard-to-detect image steganography
☆44Updated 6 months ago
Alternatives and similar repositories for hstego
Users that are interested in hstego are comparing it to the libraries listed below
Sorting:
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆102Updated 3 years ago
- An open-source toolbox for steganalysis☆178Updated 2 months ago
- Steganography in Twitter using retweets☆12Updated 3 years ago
- A steganalysis tool for detecting LSB steganography in images☆221Updated 7 years ago
- A list of attacks or malware using steganography or information hiding☆67Updated last year
- Memory Dump☆22Updated 7 years ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆74Updated 3 years ago
- Python scripts for Malware Bazaar☆154Updated last year
- Implementation of several Steganography and steganalysis techniques.☆48Updated last year
- A quick reference guide for python script development in DFIR☆18Updated last year
- ☆70Updated 5 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆173Updated 4 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆38Updated 5 years ago
- Forensics Wiki, a wiki devoted to information about digital forensics (also known as computer forensics)☆290Updated 3 weeks ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated 2 years ago
- The best tools and resources for forensic analysis.☆165Updated 2 years ago
- Volatility3 plugins developed and maintained by the community☆59Updated 2 years ago
- FIT is a Python3 application for forensic acquisition of contents like web pages, emails, social media, etc. directly from the internet.☆85Updated 5 months ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆85Updated 4 years ago
- Signal database acquisition and decryption.☆29Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆130Updated last year
- A curated list of iOS Forensics References, organized by folder with specific references (links to blog post, research paper, articles, a…☆225Updated last year
- A curated dataset of malware and benign Windows executable samples for malware researchers☆48Updated 10 months ago
- Resources provided by the community that can serve to be useful for Law Enforcement worldwide☆110Updated last year
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆11Updated 6 years ago
- A large-scale database of malicious software images☆48Updated 4 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆109Updated last week
- ☆48Updated 6 months ago
- ☆74Updated 5 months ago