Stego is a steganographic Swiss army knife that features cross-platform encoding and decoding of images/text/binary files into photos, fast and nearly undetectable encoding, smart stdin/stdout detection, lossless decoding of data, simple stateless CLI, zero system-dependencies, and supports text and file encoding/decoding as well as stdin detection.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Helm plugin for cryptographically signing and verifying charts with GnuPG integration.
A security solution that monitors, detects, and responds to insider threats by providing visibility into user activities across endpoints, email, and cloud to prevent data loss from careless, compromised, or malicious insiders.
SOPS is an editor of encrypted files supporting various formats and encryption methods.
Microsoft BitLocker is a full volume encryption feature in Windows for protecting data on lost or stolen devices, with tools and resources for implementation.
Red October is a software-based two-man rule style encryption and decryption server.
TestDisk checks disk partitions and recovers lost partitions, while PhotoRec specializes in recovering lost pictures from digital camera memory or hard disks.
Hide data in images while maintaining perceptual similarity and extract it from printed and photographed images.
BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.