Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats. It extracts any trailing data after the image's closing bytes and any hidden files embedded within the image. The tool relies on magic numbers, hexdumps, and binary data alone, and does not support Steganography related to color/pixel/filter/LSB. Note that short byte combinations might create false positives, and manual review of the hexdump may be necessary in complex cases.
FEATURES
SIMILAR TOOLS
A library for accessing and parsing Windows NT Registry File (REGF) format files, designed for digital forensics and registry analysis applications.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
An open source format for storing digital evidence and data, with a C/C++ library for creating, reading, and manipulating AFF4 images.
A library for read-only access to QEMU Copy-On-Write (QCOW) image files, supporting multiple versions and compression formats for digital forensics analysis.
A comprehensive incident response tool for Windows computers, providing advanced memory forensics and access to locked systems.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
TestDisk is a free data recovery software that can recover lost partitions and undelete files from various file systems.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.