This project explores hiding data in images while maintaining perceptual similarity, allowing the extraction of data from printed and photographed images with introduced corruptions. The repository contains code, pretrained models, and training resources.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
Steghide is a steganography program that hides data in image and audio files.
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
A demonstration of a method to delete a locked executable or currently running file from disk.
A steganographic file system in userspace for plausible deniability of files.
Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.
Themis is an open-source cryptographic services library that provides high-level encryption and data protection capabilities for securing data during authentication, storage, messaging, and network exchange.
A secure file and drive wiping tool that overwrites data with randomized ASCII characters to prevent data recovery.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.