Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Yet another Stego Tool

License

NotificationsYou must be signed in to change notification settings

bannsec/stegoVeritas

Repository files navigation

Unit TestsPyPI StatisticsLatest Release

StegoVeritas

Yet another Stego Tool

Quick Start

Install

Option 1 -- pip

$ pip3 install stegoveritas$ stegoveritas_install_deps

stegoveritas_install_deps currently supports: ubuntu, debian, kali, parrotOS, fedora, archlinux and MacOS.

Option 2 -- docker

$ sudo docker run -it --rm bannsec/stegoveritas

Option 3 --BlackArch

$ sudo pacman -S stegoveritas

PKGBUILD

Running

StegoVeritas has default actions for most image types (gif,jpeg,png,tiff,bmp)and will attempt to run onany file.

stegoveritas <file>

If you want to do something specific, you can check out the help:

stegoveritas -husage: stegoveritas [-h] [-out dir] [-debug] [-password PASSWORD]                    [-wordlist WORDLIST] [-meta] [-imageTransform]                    [-bruteLSB] [-colorMap [N [N ...]]]                    [-colorMapRange Start End] [-extractLSB]                    [-red index [index ...]] [-green index [index ...]]                    [-blue index [index ...]] [-alpha index [index ...]]                    [-extract_frames] [-trailing] [-steghide] [-exif]                    [-xmp] [-carve] [-steghide]                    fileYet another Stego toolpositional arguments:  file                  The file to analyzeoptional arguments:  -h, --help            show this help message and exit  -out dir              Directory to place output in. Defaults to ./results  -debug                Enable debugging logging.  -password PASSWORD    When applicable, attempt to use this password to                        extract data.  -wordlist WORDLIST    When applicable, attempt to brute force with this                        wordlist.image options:  -meta                 Check file for metadata information  -imageTransform       Perform various image transformations on the input                        image and save them to the output directory  -bruteLSB             Attempt to brute force any LSB related steganography.  -colorMap [N [N ...]]                        Analyze a color map. Optional arguments are colormap                        indexes to save while searching  -colorMapRange Start End                        Analyze a color map. Same as colorMap but implies a                        range of colorMap values to keep  -extractLSB           Extract a specific LSB RGB from the image. Use with                        -red, -green, -blue, and -alpha  -red index [index ...]  -green index [index ...]  -blue index [index ...]  -alpha index [index ...]  -extract_frames       Split up an animated gif into individual frames.  -trailing             Check for trailing data on the given file  -steghide             Check for StegHide hidden info.multi options:  -exif                 Check this file for exif information.  -xmp                  Check this file for XMP information.  -carve                Attempt to carve/extract things from this file.Have a good example? Wish it did something more? Submit a ticket:https://github.com/bannsec/stegoVeritas

[8]ページ先頭

©2009-2025 Movatter.jp