Visit Website

This project is a Docker image useful for solving Steganography challenges as those you can find at CTF platforms like hackthebox.eu. The image comes pre-installed with many popular tools and several screening scripts you can use check simple things. Usage: First make sure you have Docker installed. Then you can use the shell scripts bin/build.sh and bin/run.sh in this repo to build the image and run the container. You will be dropped into a bash shell inside the container. It will have the data folder mounted, into which you can put the files to analyze. If you don't use the scripts, follow these steps: Build image (docker build -t <image_name> .) or pull from Docker hub (docker pull dominicbreuker/stego-toolkit). Start a container with your files mounted to the folder /data (docker run -it <image_name> -v /local/folder/with/data:/data /bin/bash). Use CLI tools and screening scripts on your files: e.g., run check_jpg.sh image.jpg to create a quick report, or run brute_jpg.sh image.jpg wordlist.txt to try extracting hidden data with various tools and passwords.

FEATURES

ALTERNATIVES

Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.

OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.

A browser extension that helps you find and track sensitive data exposure across the web.

A PHP 5.x polyfill for random_bytes() and random_int() created by Paragon Initiative Enterprises.

A machine learning-based approach to detect and prevent data breaches using natural language processing and machine learning algorithms.

A project focusing on deconstructing and utilizing data for security using Python modules like IPython, Pandas, and Scikit Learn.

Steganography brute-force utility with performance issues, deprecated in favor of stegseek.

Secure file erasing utility for Mac OS X

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved