StegCracker v2.1 releases: Steganography brute-force utility to uncover hidden data inside files
Steganography brute-force utility to uncover hidden data inside files.
- Made default wordlist handling more user-friendly, sould address issue #14
- – If no wordlist is specified Kali Linuxes rockyou.txt will be used
- – If the rockyou is not found, but the gzipped version is, a message will be printed
- – If neither was found the program will quit with a message stating to use a custom wordlist
To install the program, follow these steps:
Using stegcracker is simple, pass a file to it as it’s the first parameter and optionally pass the path to a wordlist of passwords to try as it’s the second parameter. If this is not set it will default to the rockyou.txt password file which ships with Kali Linux.
$ stegcracker <file> [<wordlist>]
Copyright 2019 – Luke Paris (Paradoxis)