All Projects → Paradoxis → Stegcracker

Paradoxis / Stegcracker

Licence: mit
Steganography brute-force utility to uncover hidden data inside files

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Stegcracker

Stegseek
⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (-52.78%)
Mutual labels:  pentesting, ctf, brute-force, ctf-tools, steganography
Flask Unsign
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (-77.27%)
Mutual labels:  pentesting, penetration-testing, ctf, ctf-tools
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-67.17%)
Mutual labels:  pentesting, penetration-testing, ctf, ctf-tools
Stegbrute
Fast Steganography bruteforce tool written in Rust useful for CTF's
Stars: ✭ 134 (-66.16%)
Mutual labels:  ctf, brute-force, ctf-tools, steganography
Thc Hydra
hydra
Stars: ✭ 5,645 (+1325.51%)
Mutual labels:  pentesting, penetration-testing, brute-force
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+28.54%)
Mutual labels:  pentesting, ctf, ctf-tools
Ciphey
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Stars: ✭ 9,116 (+2202.02%)
Mutual labels:  pentesting, ctf, ctf-tools
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+220.2%)
Mutual labels:  pentesting, ctf, steganography
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-86.62%)
Mutual labels:  pentesting, ctf, ctf-tools
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-70.71%)
Mutual labels:  pentesting, penetration-testing, ctf-tools
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-58.08%)
Mutual labels:  pentesting, penetration-testing, ctf
Knary
A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (-52.78%)
Mutual labels:  pentesting, penetration-testing, ctf-tools
Print My Shell
Python script wrote to automate the process of generating various reverse shells.
Stars: ✭ 140 (-64.65%)
Mutual labels:  penetration-testing, ctf, ctf-tools
Stegextract
Detect hidden files and text in images
Stars: ✭ 79 (-80.05%)
Mutual labels:  penetration-testing, ctf, steganography
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+1729.8%)
Mutual labels:  pentesting, penetration-testing, brute-force
Karkinos
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
Stars: ✭ 115 (-70.96%)
Mutual labels:  pentesting, ctf, ctf-tools
xeca
PowerShell payload generator
Stars: ✭ 103 (-73.99%)
Mutual labels:  penetration-testing, ctf, ctf-tools
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-91.16%)
Mutual labels:  penetration-testing, pentesting, ctf-tools
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-3.54%)
Mutual labels:  pentesting, penetration-testing
Elliot
A pentesting tool inspired by mr robot and derived by zphisher
Stars: ✭ 23 (-94.19%)
Mutual labels:  penetration-testing, pentesting

StegCracker

Build Status PyPI version codecov pulls

Steganography brute-force utility to uncover hidden data inside files.
Looking for the Docker repository? You can find it here

Deprecation

Stop wasting time and CPU, use stegseek instead! Not convinced? Look at these benchmarks (stolen with love):

password Line Stegseek v0.4 Stegcracker 2.0.9 Stegbrute v0.1.1 (-t 8)
"cassandra" 1 000 0.9s 3.1s 0.7s
"kupal" 10 000 0.9s 14.4s 7.1s
"sagar" 100 000 0.9s 2m23.0s 1m21.9s
"budakid1" 1 000 000 0.9s [p] 23m50.0s 13m45.7s
"␣␣␣␣␣␣␣1" 14 344 383 1.9s [p] 5h41m52.5s [p] 3h17m38.0s

While I've enjoyed building this tool it is and always will built on bad foundations. StegCracker started out as a dirty hack for a problem which didn't have any good or easy to use solutions, it's biggest limiting factor however is that it relies on just spamming thousand of subprocess calls per second which (despite being optimized slightly with multiple threads) is just horrible for performance.

So, as a result, after three years of managing the project I've decided to pass on the torch and officially retire the project. Thanks for the support and thank you @RickdeJager for building a better version 🎉

Usage

Using stegcracker is simple, pass a file to it as it's first parameter and optionally pass the path to a wordlist of passwords to try as it's second parameter. If you don't specify the wordlist, the tool will try to use the built-in rockyou.txt wordlist which ships with Kali Linux. If you are running a different distribution, you can download the rockyou wordlist here.

$ stegcracker <file> [<wordlist>]

Or using Docker:

$ docker run -v $(pwd)/data/:/data -it paradoxis/stegcracker example.jpg

Requirements

The program requires the steghide binary, and Python 3.6 or higher to be installed. If python 3.6 is not installed, check out this guide on how to do so. Steghide can be installed by using the following command (Kali Linux):

$ sudo apt-get install steghide -y

Installation

To install StegCracker, run the following command:

$ pip3 install stegcracker

Or pull the latest docker image:

$ docker pull paradoxis/stegcracker

Updating

To update StegCracker, simply pass -U to the installation command:

$ pip3 install stegcracker -U --force-reinstall

Example

demo

FAQ / Troubleshooting

  • I can't install the tool with pip3, but python 3.6+ is installed

    • Your pip binary might be using a different version of Python. Try installing it directly through Python like so (replace "X" with your minor version, eg: python3.6): python3.X -m pip install -U stegcracker
  • I installed the tool, but when I run stegcracker it just returns 'command not found'

    • Chances are your Python's bin directory is not in your PATH envrionment variable. As a dirty fix you could add the following to your ~/.bashrc file: alias stegcracker='python3 -m stegcracker'
  • I'm using StegCracker 1.X, how do I upgrade?

    • If you're upgrading StegCracker from the original 1.X release, please remove the existing version first using: sudo rm --force $(which stegcracker)
  • I want to run an older version of StegCracker, how do I obtain a copy?

    • While I recommended using the latest and greatest version, you might want to install an older version of StegCracker. You can do this by checking out the releases page. (Note: all issues or pull requests regarding this version will be be ignored).
  • Can I run this tool on other Linux distro's?

    • As long as you have a valid version of Python 3.6 and steghide in your path it should work. Please note that the tool has officially been tested on Kali Linux, all other platforms might be unstable. If you find a bug on another distro, please submit an issue and I'll see what I can do (but do fill in the template as well).
  • Can I run StegCracker on Windows?

    • As far as I know there aren't any official steghide releases for Windows, so as far as I'm aware: no

License

Copyright 2020 - Luke Paris (Paradoxis)

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].