Data Protection
Tools and techniques for safeguarding sensitive data and implementing robust encryption.Explore 88 curated tools and resources
RELATED TASKS
PINNED
Promoted • 4 toolsWant your tool featured here?
Get maximum visibility with pinned placement
LATEST ADDITIONS
A command line tool for transparently hiding files within images using LSB steganography.
A command line tool for transparently hiding files within images using LSB steganography.
A PHP library for secure data encryption with easy-to-use API.
Steganographic Swiss army knife for encoding and decoding data into images.
Steganographic Swiss army knife for encoding and decoding data into images.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
Toolkit for secure destruction of sensitive data with customizable overwrite methods.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.
Tang is a server for binding data to network presence, providing an easy and secure alternative to key escrow.
A deep dive into the Ledger connect-kit compromise decryption process.
A deep dive into the Ledger connect-kit compromise decryption process.
The Update Framework (TUF) provides a cryptographic framework for securing software update systems through offline content signing and verification mechanisms.
The Update Framework (TUF) provides a cryptographic framework for securing software update systems through offline content signing and verification mechanisms.
A Docker image with tools for solving Steganography challenges and screening scripts for analyzing files.
A Docker image with tools for solving Steganography challenges and screening scripts for analyzing files.
Recoverjpeg is a tool for recovering JPEG images from damaged storage media.
Recoverjpeg is a tool for recovering JPEG images from damaged storage media.
Tenzir is a data pipeline solution for optimizing cloud and data costs, running detections and analytics.
Tenzir is a data pipeline solution for optimizing cloud and data costs, running detections and analytics.
Showcasing bad cryptography and discussing flawed crypto design.
Clevis is a pluggable framework for automated decryption.
Tool to clean Exif data from images in AWS S3 bucket
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
A tool for securely backing up and versioning production secrets or shared passwords
A tool for securely backing up and versioning production secrets or shared passwords
Microsoft BitLocker is a full volume encryption feature in Windows for protecting data on lost or stolen devices, with tools and resources for implementation.
Microsoft BitLocker is a full volume encryption feature in Windows for protecting data on lost or stolen devices, with tools and resources for implementation.
StegCloak is a JavaScript steganography module for hiding secrets inside text using invisible characters.
StegCloak is a JavaScript steganography module for hiding secrets inside text using invisible characters.
Microsoft Azure service for safeguarding cryptographic keys and secrets.
Microsoft Azure service for safeguarding cryptographic keys and secrets.
GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.
GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.
Automated tool for detecting steganographic content in images, with F5 detection capabilities.
Automated tool for detecting steganographic content in images, with F5 detection capabilities.
A tool for xor analysis to guess key length and key based on most frequent characters.
A tool for xor analysis to guess key length and key based on most frequent characters.