Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/bannsec/stegoVeritas

Yet another Stego Tool
https://github.com/bannsec/stegoVeritas

python3 steganography stego

Last synced: 24 days ago
JSON representation

Yet another Stego Tool

Awesome Lists containing this project

README

        

[![Unit Tests](https://github.com/bannsec/stegoVeritas/actions/workflows/unit_tests.yml/badge.svg)](https://github.com/bannsec/stegoVeritas/actions/workflows/unit_tests.yml)
[![PyPI Statistics](https://img.shields.io/pypi/dm/stegoveritas.svg)](https://pypistats.org/packages/stegoveritas)
[![Latest Release](https://img.shields.io/pypi/v/stegoveritas.svg)](https://pypi.python.org/pypi/stegoveritas/)

# StegoVeritas
Yet another Stego Tool

# Quick Start

## Install

### Option 1 -- pip

```bash
$ pip3 install stegoveritas
$ stegoveritas_install_deps
```

`stegoveritas_install_deps` currently supports: ubuntu, debian, kali, parrotOS, fedora, archlinux and MacOS.

### Option 2 -- docker

```bash
$ sudo docker run -it --rm bannsec/stegoveritas
```

### Option 3 -- [BlackArch](https://blackarch.org/)

```bash
$ sudo pacman -S stegoveritas
```

[PKGBUILD](https://github.com/BlackArch/blackarch/blob/master/packages/stegoveritas/PKGBUILD)

## Running
StegoVeritas has default actions for most image types (gif,jpeg,png,tiff,bmp)
and will attempt to run on __any__ file.

`stegoveritas `

If you want to do something specific, you can check out the help:

```
stegoveritas -h
usage: stegoveritas [-h] [-out dir] [-debug] [-password PASSWORD]
[-wordlist WORDLIST] [-meta] [-imageTransform]
[-bruteLSB] [-colorMap [N [N ...]]]
[-colorMapRange Start End] [-extractLSB]
[-red index [index ...]] [-green index [index ...]]
[-blue index [index ...]] [-alpha index [index ...]]
[-extract_frames] [-trailing] [-steghide] [-exif]
[-xmp] [-carve] [-steghide]
file

Yet another Stego tool

positional arguments:
file The file to analyze

optional arguments:
-h, --help show this help message and exit
-out dir Directory to place output in. Defaults to ./results
-debug Enable debugging logging.
-password PASSWORD When applicable, attempt to use this password to
extract data.
-wordlist WORDLIST When applicable, attempt to brute force with this
wordlist.

image options:
-meta Check file for metadata information
-imageTransform Perform various image transformations on the input
image and save them to the output directory
-bruteLSB Attempt to brute force any LSB related steganography.
-colorMap [N [N ...]]
Analyze a color map. Optional arguments are colormap
indexes to save while searching
-colorMapRange Start End
Analyze a color map. Same as colorMap but implies a
range of colorMap values to keep
-extractLSB Extract a specific LSB RGB from the image. Use with
-red, -green, -blue, and -alpha
-red index [index ...]
-green index [index ...]
-blue index [index ...]
-alpha index [index ...]
-extract_frames Split up an animated gif into individual frames.
-trailing Check for trailing data on the given file
-steghide Check for StegHide hidden info.

multi options:
-exif Check this file for exif information.
-xmp Check this file for XMP information.
-carve Attempt to carve/extract things from this file.

Have a good example? Wish it did something more? Submit a ticket:
https://github.com/bannsec/stegoVeritas
```