steg86 Logo

steg86

0
Free
Visit Website

steg86 is a format-agnostic steganographic tool for x86 and AMD64 binaries. You can use it to hide information in compiled programs, regardless of executable format (PE, ELF, Mach-O, raw, &c). It has no performance or size impact on the files that it modifies (adding a message does not increase binary size or decrease execution speed). Installation: steg86 can be installed via cargo: $ cargo install steg86 Alternatively, you can build it in this repository with cargo build: $ cargo build Usage: See steg86 --help for a full list of flags and subcommands. Profiling: To profile a binary for steganographic suitability: $ steg86 profile /bin/bash Summary for /bin/bash: 175828 total instructions 27957 potential semantic pairs 19 potential commutative instructions 27944 bits of information capacity (3493 bytes, approx. 3KB) Embedding: To embed a message into a binary: $ steg86 embed /bin/bash ./bash.steg <<< "here is my secret message" By default, steg86 embed writes its output to $input.steg. For example, /lib64/ld-linux-x86-64.so.2 would become /lib64/ld-linux-x86-64.so.2.steg. steg86 embed will exit with a no

FEATURES

ALTERNATIVES

Automated tool for detecting steganographic content in images, with F5 detection capabilities.

Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.

Realtime privacy monitoring service for smartphones that analyzes how apps handle private information.

A tool for recovering files by scanning block devices and extracting them based on 'magic bytes' in file contents.

Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.

OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.

Securely wipe files and drives with randomized ASCII dicks.

GPG Sync is a tool designed to keep OpenPGP public keys up-to-date within an organization by offloading the complexity of key management to a single trusted person.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved