daniellerch / hstegoLinks
Hard-to-detect image steganography
☆45Updated 9 months ago
Alternatives and similar repositories for hstego
Users that are interested in hstego are comparing it to the libraries listed below
Sorting:
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆101Updated 3 years ago
- An open-source toolbox for steganalysis☆186Updated last month
- Steganography in Twitter using retweets☆12Updated 3 years ago
- A list of attacks or malware using steganography or information hiding☆68Updated last year
- A steganalysis tool for detecting LSB steganography in images☆229Updated 7 years ago
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆635Updated last month
- A free online class on network information hiding/steganography/covert channels.☆105Updated 5 months ago
- Implementation of several Steganography and steganalysis techniques.☆50Updated last month
- A curated dataset of malware and benign Windows executable samples for malware researchers☆50Updated last week
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆75Updated 3 years ago
- Memory Dump☆22Updated 7 years ago
- Toolkit for Filesystem based Data Hiding Techniques.☆39Updated 6 years ago
- Signal database acquisition and decryption.☆29Updated 3 years ago
- Linked Pixel Steganography (LPS) technique is a variant of the well-known LSB steganography. It can be applied to any type of images.☆18Updated 2 years ago
- A small python app to embed "secret" user data into a carrier image by manipulation of the Discrete Cosine Transform (DCT) AC coefficient…☆38Updated last year
- Very simple frequency domain(FFT based) image steganography/waterprint/signature. https://www.zhihu.com/question/50735753/answer/12259327…☆23Updated 5 years ago
- Volatility Symbol Generator for Linux Kernels☆36Updated 2 years ago
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces…☆283Updated 2 years ago
- Pure-Python library for computing fuzzy hashes (ssdeep)☆44Updated last week
- ☆55Updated 6 years ago
- An Improved CNN Steganalysis Architecture Based on “Catalyst Kernels” and Transfer Learning☆26Updated 6 years ago
- A distortion limiting approach to Syndrome-Trellis Coding.☆18Updated 2 years ago
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆11Updated 6 years ago
- The best tools and resources for forensic analysis.☆164Updated 2 years ago
- Forensics Wiki, a wiki devoted to information about digital forensics (also known as computer forensics)☆298Updated last month
- Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!☆175Updated 4 years ago
- Volatility3 plugins developed and maintained by the community☆60Updated 2 years ago
- Malware hashes for open source projects.☆84Updated 9 months ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.☆90Updated 8 years ago
- An advanced cryptography tool for hashing, encrypting, encoding, steganography and more.☆17Updated 3 years ago