Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/bannsec/stegoVeritas
Yet another Stego Tool
https://github.com/bannsec/stegoVeritas
python3 steganography stego
Last synced: 24 days ago
JSON representation
Yet another Stego Tool
- Host: GitHub
- URL: https://github.com/bannsec/stegoVeritas
- Owner: bannsec
- License: gpl-2.0
- Created: 2015-08-10T01:30:44.000Z (over 9 years ago)
- Default Branch: master
- Last Pushed: 2023-07-03T23:15:06.000Z (over 1 year ago)
- Last Synced: 2024-07-17T06:39:57.962Z (5 months ago)
- Topics: python3, steganography, stego
- Language: Python
- Size: 2.26 MB
- Stars: 342
- Watchers: 12
- Forks: 40
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
- awesome-anti-forensic - StegoVeritas
README
[![Unit Tests](https://github.com/bannsec/stegoVeritas/actions/workflows/unit_tests.yml/badge.svg)](https://github.com/bannsec/stegoVeritas/actions/workflows/unit_tests.yml)
[![PyPI Statistics](https://img.shields.io/pypi/dm/stegoveritas.svg)](https://pypistats.org/packages/stegoveritas)
[![Latest Release](https://img.shields.io/pypi/v/stegoveritas.svg)](https://pypi.python.org/pypi/stegoveritas/)# StegoVeritas
Yet another Stego Tool# Quick Start
## Install
### Option 1 -- pip
```bash
$ pip3 install stegoveritas
$ stegoveritas_install_deps
````stegoveritas_install_deps` currently supports: ubuntu, debian, kali, parrotOS, fedora, archlinux and MacOS.
### Option 2 -- docker
```bash
$ sudo docker run -it --rm bannsec/stegoveritas
```### Option 3 -- [BlackArch](https://blackarch.org/)
```bash
$ sudo pacman -S stegoveritas
```[PKGBUILD](https://github.com/BlackArch/blackarch/blob/master/packages/stegoveritas/PKGBUILD)
## Running
StegoVeritas has default actions for most image types (gif,jpeg,png,tiff,bmp)
and will attempt to run on __any__ file.`stegoveritas `
If you want to do something specific, you can check out the help:
```
stegoveritas -h
usage: stegoveritas [-h] [-out dir] [-debug] [-password PASSWORD]
[-wordlist WORDLIST] [-meta] [-imageTransform]
[-bruteLSB] [-colorMap [N [N ...]]]
[-colorMapRange Start End] [-extractLSB]
[-red index [index ...]] [-green index [index ...]]
[-blue index [index ...]] [-alpha index [index ...]]
[-extract_frames] [-trailing] [-steghide] [-exif]
[-xmp] [-carve] [-steghide]
fileYet another Stego tool
positional arguments:
file The file to analyzeoptional arguments:
-h, --help show this help message and exit
-out dir Directory to place output in. Defaults to ./results
-debug Enable debugging logging.
-password PASSWORD When applicable, attempt to use this password to
extract data.
-wordlist WORDLIST When applicable, attempt to brute force with this
wordlist.image options:
-meta Check file for metadata information
-imageTransform Perform various image transformations on the input
image and save them to the output directory
-bruteLSB Attempt to brute force any LSB related steganography.
-colorMap [N [N ...]]
Analyze a color map. Optional arguments are colormap
indexes to save while searching
-colorMapRange Start End
Analyze a color map. Same as colorMap but implies a
range of colorMap values to keep
-extractLSB Extract a specific LSB RGB from the image. Use with
-red, -green, -blue, and -alpha
-red index [index ...]
-green index [index ...]
-blue index [index ...]
-alpha index [index ...]
-extract_frames Split up an animated gif into individual frames.
-trailing Check for trailing data on the given file
-steghide Check for StegHide hidden info.multi options:
-exif Check this file for exif information.
-xmp Check this file for XMP information.
-carve Attempt to carve/extract things from this file.Have a good example? Wish it did something more? Submit a ticket:
https://github.com/bannsec/stegoVeritas
```