korczis / foremostLinks
Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a configuration file or you…
☆332Updated 2 years ago
Alternatives and similar repositories for foremost
Users that are interested in foremost are comparing it to the libraries listed below
Sorting:
- UNMAINTAINED. USE AT OWN RISK. Stegdetect is an automated tool for detecting steganographic content in images.☆414Updated 6 years ago
- Yet another Stego Tool☆389Updated 2 years ago
- detect stegano-hidden data in PNG & BMP☆1,463Updated last month
- pkcrack with modern building tools☆197Updated 3 years ago
- A braindead program for cracking encrypted ZIP archives. Forked from http://oldhome.schmorp.de/marc/fcrackzip.html☆457Updated 2 years ago
- Stegdetect is an automated tool for detecting steganographic content in images.☆69Updated 3 years ago
- PCRT (PNG Check & Repair Tool), a tool to help check and fix the error in a PNG image.☆247Updated 3 years ago
- jphide & seek steganography tools☆87Updated 7 years ago
- A tool to analyze multi-byte xor cipher☆1,453Updated 4 months ago
- An unmaintained fork of the OutGuess steganographic tool. Try https://github.com/resurrecting-open-source-projects/outguess for possibly…☆157Updated 8 years ago
- ImmunityDebugger☆331Updated 5 years ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- A web-based, accessible and open-source port of StegSolve.☆353Updated last year
- Steganography brute-force utility to uncover hidden data inside files☆576Updated 4 years ago
- This program locally checks for signs of a rootkit. 'Forked' to fix false-positive for SucKIT rootkit☆239Updated 2 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,111Updated 3 years ago
- repair corrupted pcap files☆223Updated last year
- Script for searching the extracted firmware file system for goodies!☆1,162Updated 2 years ago
- ☆669Updated last year
- generate and search pattern string for exploit development☆201Updated 7 months ago
- A colleciton of CTF write-ups all using pwntools☆517Updated 8 years ago
- Volatility profiles for Linux and Mac OS X☆328Updated 2 years ago
- Try to find the password of a file that was encrypted with the 'openssl' command.☆227Updated last year
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆631Updated 11 months ago
- Phoenix☆47Updated 6 years ago
- ☆541Updated 2 years ago
- The Damn Vulnerable Router Firmware Project☆695Updated 4 years ago
- Scalpel is an open source data carving tool. It is not being actively maintained.☆658Updated last year
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆528Updated last year
- Project HashClash - MD5 & SHA-1 cryptanalysis☆877Updated 4 months ago