Stegextract is a Bash script that extracts hidden files and strings from images, supporting PNG, JPG, and GIF formats. It extracts any trailing data after the image's closing bytes and any hidden files embedded within the image. The tool relies on magic numbers, hexdumps, and binary data alone, and does not support Steganography related to color/pixel/filter/LSB. Note that short byte combinations might create false positives, and manual review of the hexdump may be necessary in complex cases.
FEATURES
SIMILAR TOOLS
A library to access and read QEMU Copy-On-Write (QCOW) image file formats with support for zlib compression and AES-CBC encryption.
Free software for extracting Microsoft cabinet files, supporting all features and formats of Microsoft cabinet files and Windows CE installation files.
A digital artifact extraction framework for extracting data from volatile memory (RAM) samples, providing visibility into the runtime state of a system.
Zenduty's platform provides real-time operational health monitoring and incident response orchestration to improve incident response times and build a solid on-call culture.
A PowerShell-based incident response and live forensic data acquisition tool for Windows hosts.
A library to access FileVault Drive Encryption (FVDE) encrypted volumes on Mac OS X systems.
A command-line tool for creating hex dumps, converting between binary and human-readable representations, and patching binary files.
Exterro is a data risk management platform that optimizes e-discovery, digital forensics, and cybersecurity compliance operations.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.