detect stegano-hidden data in PNG & BMP
☆1,547Jan 28, 2026Updated last month
Alternatives and similar repositories for zsteg
Users that are interested in zsteg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of steganography tools - helps with CTF challenges☆2,644Nov 27, 2022Updated 3 years ago
- Yet another Stego Tool☆402Jul 3, 2023Updated 2 years ago
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,838Mar 2, 2026Updated 3 weeks ago
- Some setup scripts for security research tools.☆9,333Mar 1, 2026Updated 3 weeks ago
- LSB steganography and detection☆629Aug 7, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Steganography brute-force utility to uncover hidden data inside files☆592Dec 25, 2020Updated 5 years ago
- A tool to analyze multi-byte xor cipher☆1,477May 21, 2025Updated 10 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,304Mar 5, 2026Updated 2 weeks ago
- Web path scanner☆14,114Mar 16, 2026Updated last week
- Least Significant Bit Steganography for bitmap images (.bmp and .png), WAV sound files, and byte sequences. Simple LSB Steganalysis (LSB …☆647Oct 10, 2025Updated 5 months ago
- CTF framework and exploit development library☆13,328Updated this week
- An advanced memory forensics framework☆7,987May 16, 2025Updated 10 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,131Apr 21, 2024Updated last year
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,334Apr 18, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,252Oct 10, 2023Updated 2 years ago
- Rip web accessible (distributed) version control systems: SVN/GIT/HG...☆1,777Jul 19, 2024Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆8,812Dec 4, 2025Updated 3 months ago
- Build a database of libc offsets to simplify exploitation☆1,858Oct 23, 2024Updated last year
- A steganography tool for embedding payloads within Python bytecode.☆153Dec 2, 2019Updated 6 years ago
- A set of security related tools☆686Mar 8, 2021Updated 5 years ago
- PEDA - Python Exploit Development Assistance for GDB☆6,110Jul 29, 2024Updated last year
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,392Dec 16, 2025Updated 3 months ago
- USB键盘流量包取证工具 , 用于恢复用户的击键信息☆379Feb 11, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 盲水印 by python☆1,083May 6, 2025Updated 10 months ago
- Volatility 3.0 development☆3,997Mar 16, 2026Updated last week
- USB mouse traffic packet forensic tool, mainly used to draw mouse movements and dragging trajectories☆277Dec 16, 2025Updated 3 months ago
- ☆301Aug 26, 2023Updated 2 years ago
- CTFs as you need them☆6,579Updated this week
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,230Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆15,560Mar 19, 2026Updated last week
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,105Feb 28, 2025Updated last year
- Firmware Analysis Tool☆13,754Feb 5, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Linux privilege escalation auditing tool☆6,431Updated this week
- F5 steganography☆261Nov 16, 2021Updated 4 years ago
- Web application fuzzer☆6,445Jan 21, 2026Updated 2 months ago
- Monitor linux processes without root permissions☆5,939Mar 1, 2026Updated 3 weeks ago
- GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Li…☆8,058Mar 18, 2026Updated last week
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,775Sep 29, 2025Updated 5 months ago
- A `.git` folder disclosure exploit☆3,530Feb 1, 2023Updated 3 years ago