StegCracker v2.1 releases: Steganography brute-force utility to uncover hidden data inside files

StegCracker

StegCracker

Steganography brute-force utility to uncover hidden data inside files.

Changelog v2.0.9

  • Made default wordlist handling more user-friendly, sould address issue #14
  • – If no wordlist is specified Kali Linuxes rockyou.txt will be used
  • – If the rockyou is not found, but the gzipped version is, a message will be printed
  • – If neither was found the program will quit with a message stating to use a custom wordlist

Installation

To install the program, follow these steps:

$ sudo apt-get install steghide -y

$ sudo curl https://raw.githubusercontent.com/Paradoxis/StegCracker/master/stegcracker > /bin/stegcracker
$ sudo chmod +x /bin/stegcracker

 

Usage

Using stegcracker is simple, pass a file to it as it’s the first parameter and optionally pass the path to a wordlist of passwords to try as it’s the second parameter. If this is not set it will default to the rockyou.txt password file which ships with Kali Linux.

$ stegcracker <file> [<wordlist>]

 

demo

Copyright 2019 – Luke Paris (Paradoxis)

Source: https://github.com/Paradoxis/