All Projects → evyatarmeged → Stegextract

evyatarmeged / Stegextract

Licence: mit
Detect hidden files and text in images

Programming Languages

shell
77523 projects
bash
514 projects

Projects that are alternatives of or similar to Stegextract

Stegbrute
Fast Steganography bruteforce tool written in Rust useful for CTF's
Stars: ✭ 134 (+69.62%)
Mutual labels:  images, ctf, steganography
Stegcracker
Steganography brute-force utility to uncover hidden data inside files
Stars: ✭ 396 (+401.27%)
Mutual labels:  penetration-testing, ctf, steganography
Print My Shell
Python script wrote to automate the process of generating various reverse shells.
Stars: ✭ 140 (+77.22%)
Mutual labels:  penetration-testing, ctf
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+110.13%)
Mutual labels:  penetration-testing, ctf
xeca
PowerShell payload generator
Stars: ✭ 103 (+30.38%)
Mutual labels:  penetration-testing, ctf
Flask Unsign
Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.
Stars: ✭ 90 (+13.92%)
Mutual labels:  penetration-testing, ctf
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+14413.92%)
Mutual labels:  penetration-testing, ctf
Parsr
Transforms PDF, Documents and Images into Enriched Structured Data
Stars: ✭ 2,736 (+3363.29%)
Mutual labels:  extraction, images
ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-65.82%)
Mutual labels:  penetration-testing, ctf
Hacker101 Ctf
Hacker101 CTF Writeup
Stars: ✭ 295 (+273.42%)
Mutual labels:  penetration-testing, ctf
Vulnhub Ctf Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
Stars: ✭ 368 (+365.82%)
Mutual labels:  penetration-testing, ctf
Stegseek
⚡️ Worlds fastest steghide cracker, chewing through millions of passwords per second ⚡️
Stars: ✭ 187 (+136.71%)
Mutual labels:  ctf, steganography
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+1505.06%)
Mutual labels:  ctf, steganography
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (+64.56%)
Mutual labels:  penetration-testing, ctf
AperiSolve
Steganalysis web platform
Stars: ✭ 268 (+239.24%)
Mutual labels:  steganography, ctf
Garbro
Visual Novels resource browser
Stars: ✭ 764 (+867.09%)
Mutual labels:  extraction, images
Owasp Workshop Android Pentest
Learning Penetration Testing of Android Applications
Stars: ✭ 60 (-24.05%)
Mutual labels:  penetration-testing, ctf
Picasso
Laravel Image Management and Optimization Package
Stars: ✭ 70 (-11.39%)
Mutual labels:  images
React Inner Image Zoom
A React component for zooming images.
Stars: ✭ 76 (-3.8%)
Mutual labels:  images
Penetration Testing Cheat Sheet
Work in progress...
Stars: ✭ 69 (-12.66%)
Mutual labels:  penetration-testing

Stegextract

Bash script to extract hidden files and strings from images.

Description

Stegextract extracts any trailing data after the image's closing bytes, and any hidden files (or other images) embedded within the image.
Short byte combinations such as JPEG's FFD8 FFE0 might sometimes create false positives.
Manually reviewing the hexdump is sometimes inevitable in cases of highly complex embedded files.
Stegextract is not the solution for any color/pixel/filter/LSB related Steganography, nor does it try to be. It relies on magic numbers, hexdumps and binary data alone.
Currently supports PNG, JPG, and GIF.

Update: --analyze flag was deprecated and is now being performed automatically with every scan.

Installation

sudo curl https://raw.githubusercontent.com/evyatarmeged/stegextract/master/stegextract > /usr/local/bin/stegextract
sudo chmod +x /usr/local/bin/stegextract

Usage

Usage: stegextract <file> [options]

-h, --help                Print this and exit
-o, --outfile             Specify an outfile
-s, --strings             Extract strings from file
-q, --quiet               Do not output to stdout
--force-format            Force this image format instead of detecting

POC:

poc

Image examples from the above GIF can be found in the examples folder.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].