jsteg is a package for hiding data inside jpeg files, a technique known as steganography. This is accomplished by copying each bit of the data into the least-significant bits of the image. The amount of data that can be hidden depends on the filesize of the jpeg; it takes about 10-14 bytes of jpeg to store each byte of the hidden data. Example: // open an existing jpeg f, _ := os.Open(filename) img, _ := jpeg.Decode(f) // add hidden data to it out, _ := os.Create(outfilename) data := []byte("my secret data") jsteg.Hide(out, img, data, nil) // read hidden data: hidden, _ := jsteg.Reveal(out) Note that the data is not demarcated in any way; the caller is responsible for determining which bytes of hidden it cares about. The easiest way to do this is to prepend the data with its length. A jsteg command is included, providing a simple wrapper around the functions of this package. It can hide and reveal data in jpeg files and supports input/output redirection. It automatically handles length prefixes and uses a magic header to identify jpegs that were produced by jsteg. A more narrowly-focused command named slink is also included. slink embeds a public
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.
A tool for securely backing up and versioning production secrets or shared passwords
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
A versatile steganography tool with various installation options and detailed usage instructions.
Red October is a TLS-based encryption server that implements two-man rule authorization, requiring multiple users to collaborate for cryptographic operations.
Proton Pass is a cross-platform password manager that provides encrypted storage, password generation, and security monitoring features with integrated 2FA and dark web monitoring capabilities.
A demonstration of a method to delete a locked executable or currently running file from disk.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.