daniellerch / hstegoLinks
Hard-to-detect image steganography
☆46Updated 10 months ago
Alternatives and similar repositories for hstego
Users that are interested in hstego are comparing it to the libraries listed below
Sorting:
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆100Updated 3 years ago
- A list of attacks or malware using steganography or information hiding☆69Updated 3 weeks ago
- An open-source toolbox for steganalysis☆191Updated 2 months ago
- Steganography in Twitter using retweets☆12Updated 3 years ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆76Updated 3 years ago
- A steganalysis tool for detecting LSB steganography in images☆230Updated 7 years ago
- Implementation of several Steganography and steganalysis techniques.☆50Updated last month
- Toolkit for Filesystem based Data Hiding Techniques.☆39Updated 6 years ago
- An advanced cryptography tool for hashing, encrypting, encoding, steganography and more.☆17Updated 4 years ago
- A quick reference guide for python script development in DFIR☆17Updated last year
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆19Updated 2 years ago
- Memory Dump☆22Updated 7 years ago
- Search datasets for Bitlocker recovery files and triage live systems for Bitlocker keys.☆50Updated 11 months ago
- Signal database acquisition and decryption.☆30Updated 3 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆86Updated 6 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆18Updated 2 years ago
- ☆56Updated 6 years ago
- A curated dataset of malware and benign Windows executable samples for malware researchers☆51Updated last month
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆11Updated 7 years ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Updated last year
- Malware hashes for open source projects.☆84Updated 11 months ago
- Analyze and help extract older "hidden" versions of a pdf from the current pdf.☆87Updated 3 years ago
- CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.☆17Updated 7 months ago
- Unofficial Iranian hackers group disk wiper malware aka "Shamoon" in .NET 2.0☆13Updated 7 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- FIT is a modular suite of Python applications for digital forensic acquisition of online contents such as web pages, emails, social media…☆92Updated 2 months ago
- Tools to recover, extract and decrypt Atomic wallets☆11Updated 3 weeks ago
- A project named "STEGANOGRAPHY TOOLS " that provide 4 types of Steganography { Image, Text, Audio, Video } that hides User's Text message…☆102Updated 2 years ago
- Volatility3 plugins developed and maintained by the community☆61Updated 2 years ago
- Parser for Sdba memory pool tags☆20Updated 4 years ago