Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

https://github.com/evyatarmeged/stegextract

Detect hidden files and text in images
https://github.com/evyatarmeged/stegextract

bash capture-the-flag ctf extract-images extraction hidden-files images penetration-testing steg steganography stego

Last synced: 2 months ago
JSON representation

Detect hidden files and text in images

Lists

README

        

# Stegextract
Bash script to extract hidden files and strings from images.

## Description
Stegextract extracts any trailing data after the image's closing bytes, and any hidden files (or other images) embedded within the image.

Short byte combinations such as JPEG's `FFD8 FFE0` might sometimes create false positives.

Manually reviewing the hexdump is sometimes inevitable in cases of highly complex embedded files.

Stegextract is not the solution for any color/pixel/filter/LSB related Steganography, nor does it try to be. It
relies on magic numbers, hexdumps and binary data alone.

Currently supports PNG, JPG, and GIF.

**Update**: `--analyze` flag was deprecated and is now being performed automatically with every scan.

## Installation
```
sudo sh -c 'curl https://raw.githubusercontent.com/evyatarmeged/stegextract/master/stegextract > /usr/local/bin/stegextract'
sudo chmod +x /usr/local/bin/stegextract
```

## Usage
```
Usage: stegextract [options]

-h, --help Print this and exit
-o, --outfile Specify an outfile
-s, --strings Extract strings from file
-q, --quiet Do not output to stdout
--force-format Force this image format instead of detecting
```

## POC:
![poc](poc.gif)

Image examples from the above GIF can be found in the [examples](https://github.com/evyatarmeged/stegextract/tree/master/examples) folder.