dhondta / stegano-tools
Collection of steganography tools for images and text
☆38Updated last year
Alternatives and similar repositories for stegano-tools:
Users that are interested in stegano-tools are comparing it to the libraries listed below
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 6 months ago
- A full CTF Website Server & Frontend | Extremely customizable☆59Updated 11 months ago
- A volatility 2 docker for forensic investigations☆20Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated last month
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 4 months ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆40Updated last month
- VM Lab for security☆9Updated last year
- A collection of tools that I use in CTF's or for assessments☆95Updated last month
- Xavier Framework is a user interface wrapper built on top of the Volatility(c) memory forensics framework.☆45Updated 2 years ago
- ☆38Updated 3 months ago
- My personal OT resource list, gather throughout research and internet adventure.☆71Updated last week
- SNMPv3 Authentication Bruteforcer☆35Updated 3 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- Regular Expressions List used in Digital Forensic Tasks☆82Updated last month
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆80Updated 3 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆133Updated last year
- Generate graphs and charts based on password cracking result☆162Updated 2 years ago
- linikatz is a tool to attack AD on UNIX☆145Updated last year
- ☆43Updated this week
- A public, open source physical security methodology☆44Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆37Updated last month
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆51Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- DFIR ORC PARSER PROJECT☆25Updated last month
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆89Updated 4 months ago
- Memory mapping profiles for forensic analysis using volatility 2☆47Updated 2 years ago