StegSolve is a tool used for analyzing and solving steganography challenges, providing various image analysis features such as color extraction, bit plane viewing, and more.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
An Outlook add-in for reporting suspicious emails to security teams and tracking user behavior during awareness campaigns.
A lightweight library for device identification and fingerprinting, written in Kotlin and 100% crash-free.
Android vulnerability analysis system with efficient scanning and high accuracy.
MiniCPS is a framework for real-time Cyber-Physical Systems simulation that supports physical process and control device simulation along with network emulation capabilities.
PHP Script demonstrating a smart honey pot for email form protection.
The Upstream Security Platform is a cloud-based solution for monitoring and securing connected vehicles and mobility IoT devices, offering features such as cybersecurity detection, API protection, and fraud detection.
Industrial control system automation and testing tool for SCADA security testing.
Tessian is an AI-powered cloud email security solution that protects against advanced phishing, account compromise, data exfiltration, and helps coach users on email security.
Tools and documentation for validating hardware security requirements on x86 platforms, including bootable USB key creation and platform configuration verification.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.