lucacav / steg-toolsLinks
A list of tools and material on steganography and information hiding
β16Updated last year
Alternatives and similar repositories for steg-tools
Users that are interested in steg-tools are comparing it to the libraries listed below
Sorting:
- An environment simulation for networks security tasks for development and testing AI based agents. Part of AI Dojo projectβ46Updated 2 weeks ago
- π₯ A repository for collecting cyberdefense thoughts, books, and documents about AI cyberdefenseβ12Updated last year
- A CLI tool for creating network covert channels within .pcap files.β12Updated 11 months ago
- β15Updated 5 years ago
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals andβ¦β14Updated last month
- VirusTotal Graph APIβ41Updated last year
- β32Updated last year
- A fairly robust LeetSpeak to English converter using probability of word usageβ23Updated 7 years ago
- Checking the status of Russian internet properties (via RIPE Atlas) being targeted by Ukraine's hacktivist "IT ARMY" Telegram group (and β¦β17Updated 3 years ago
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)β99Updated 2 years ago
- Development of the NIST vulnerability data ontology (Vulntology).β39Updated last week
- A feedhunter's visualisation tool.β16Updated 10 years ago
- Unofficial mirror of TestU01, a test suite for random number generator (C library) for the empirical statistical testing of uniform randoβ¦β18Updated 6 years ago
- Cryptographic Dataset Generation & Modelling Frameworkβ38Updated 5 years ago
- Sandfly Security Agentless Compromise and Intrusion Detection System For Linuxβ79Updated 2 weeks ago
- β94Updated 6 months ago
- CyHy Dashboardβ17Updated this week
- Python library for Adversarial ML Evaluationβ15Updated 5 months ago
- Gmail URL Decoder is an Open Source Python tool that can be used against plaintext or arbitrary raw data files in order to find, extract,β¦β56Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.β24Updated 8 years ago
- Experimental CPSA -- the Cryptographic Protocol Shapes Analyzer experimental versionβ18Updated last month
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns forβ¦β19Updated 7 years ago
- β55Updated 6 years ago
- 4/5 of the leaks provided by TheShadowBrokers containing content from The Equation Group.β13Updated 7 years ago
- Growing collection of Spicy-based protocol and file analyzers for Zeekβ31Updated 8 months ago
- aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based Iβ¦β22Updated 6 years ago
- Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC)β¦β16Updated 2 months ago
- Public Issue tracker to gather feedback for and allow discussions around Malpediaβ34Updated 3 years ago
- Digital Forensics Windows Registry (dfWinReg)β52Updated 5 months ago
- Next generation of Qubes OS builderβ22Updated this week