steg86 is a format-agnostic steganographic tool for x86 and AMD64 binaries. You can use it to hide information in compiled programs, regardless of executable format (PE, ELF, Mach-O, raw, &c). It has no performance or size impact on the files that it modifies (adding a message does not increase binary size or decrease execution speed). Installation: steg86 can be installed via cargo: $ cargo install steg86 Alternatively, you can build it in this repository with cargo build: $ cargo build Usage: See steg86 --help for a full list of flags and subcommands. Profiling: To profile a binary for steganographic suitability: $ steg86 profile /bin/bash Summary for /bin/bash: 175828 total instructions 27957 potential semantic pairs 19 potential commutative instructions 27944 bits of information capacity (3493 bytes, approx. 3KB) Embedding: To embed a message into a binary: $ steg86 embed /bin/bash ./bash.steg <<< "here is my secret message" By default, steg86 embed writes its output to $input.steg. For example, /lib64/ld-linux-x86-64.so.2 would become /lib64/ld-linux-x86-64.so.2.steg. steg86 embed will exit with a no
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
StegCloak is a JavaScript steganography module for hiding secrets inside text using invisible characters.
A portable public domain password hashing framework for PHP applications.
An endpoint data loss prevention solution that discovers, classifies, and protects sensitive data while controlling data transfer methods and mitigating insider threats.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
A data security platform that provides automated sensitive data discovery, access control, monitoring, and compliance capabilities for organizations managing data across multiple storage platforms.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.