daniellerch / hstegoLinks
Hard-to-detect image steganography
☆39Updated 3 months ago
Alternatives and similar repositories for hstego
Users that are interested in hstego are comparing it to the libraries listed below
Sorting:
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆99Updated 2 years ago
- An open-source toolbox for steganalysis☆174Updated 3 weeks ago
- Steganography in Twitter using retweets☆11Updated 2 years ago
- A list of attacks or malware using steganography or information hiding☆64Updated last year
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated 2 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆45Updated 7 months ago
- An implementation of S-UNIWARD steganography in python☆22Updated 4 years ago
- Implementation of several Steganography and steganalysis techniques.☆48Updated last year
- Share your Yara rules with VirusTotal☆25Updated 9 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆53Updated 5 months ago
- Memory Dump☆21Updated 7 years ago
- A steganalysis tool for detecting LSB steganography in images☆215Updated 6 years ago
- PDFExaminer Tool - Analyse PDF Malware☆57Updated 3 years ago
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆10Updated 6 years ago
- Configure FireFox with Security and Intelligance features for OSINT and Security Investigations.☆16Updated 10 months ago
- A free online class on network information hiding/steganography/covert channels.☆101Updated last month
- Signal database acquisition and decryption.☆26Updated 2 years ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆39Updated 8 months ago
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Updated 3 years ago
- CIS 4110 Comparison of Image Steganography Techniques (DCT vs LSB)☆19Updated 5 years ago
- Challenges and writeups for the US Cyber Open for 2024☆19Updated 11 months ago
- This is a Python module which facilitates text hiding in an image, using the LSB technique. It was made using Python 3.4.2 and the PIL im…☆10Updated 5 years ago
- Dump quarantined files from Windows Defender☆63Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- Volatility3 plugins developed and maintained by the community☆57Updated 2 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆37Updated 5 years ago
- Volatility Symbol Generator for Linux Kernels☆35Updated last year
- School Assignment☆29Updated 4 years ago
- If you are interested in a live feed API, please contact us☆15Updated 2 months ago
- research tool for the analysis of malicious pdf documents. make sure to run the installer first to get all of the 3rd party dlls installe…☆13Updated 11 years ago