ste

stegoveritas

Yet another Stego Tool

Showing:

Popularity

Downloads/wk

0

GitHub Stars

204

Maintenance

Last Commit

2mos ago

Contributors

14

Package

Dependencies

0

License

MIT

Categories

Readme

Unit Tests PyPI Statistics Latest Release

StegoVeritas

Yet another Stego Tool

Quick Start

Install

Option 1 -- pip

$ pip3 install stegoveritas
$ stegoveritas_install_deps

stegoveritas_install_deps currently supports: ubuntu, debian, kali, parrotOS, fedora, archlinux.

Option 2 -- docker

$ sudo docker run -it --rm bannsec/stegoveritas

Option 3 -- BlackArch

$ sudo pacman -S stegoveritas

PKGBUILD

Running

StegoVeritas has default actions for most image types (gif,jpeg,png,tiff,bmp) and will attempt to run on any file.

stegoveritas <file>

If you want to do something specific, you can check out the help:

stegoveritas -h
usage: stegoveritas [-h] [-out dir] [-debug] [-password PASSWORD]
                    [-wordlist WORDLIST] [-meta] [-imageTransform]
                    [-bruteLSB] [-colorMap [N [N ...]]]
                    [-colorMapRange Start End] [-extractLSB]
                    [-red index [index ...]] [-green index [index ...]]
                    [-blue index [index ...]] [-alpha index [index ...]]
                    [-extract_frames] [-trailing] [-steghide] [-exif]
                    [-xmp] [-carve] [-steghide]
                    file

Yet another Stego tool

positional arguments:
  file                  The file to analyze

optional arguments:
  -h, --help            show this help message and exit
  -out dir              Directory to place output in. Defaults to ./results
  -debug                Enable debugging logging.
  -password PASSWORD    When applicable, attempt to use this password to
                        extract data.
  -wordlist WORDLIST    When applicable, attempt to brute force with this
                        wordlist.

image options:
  -meta                 Check file for metadata information
  -imageTransform       Perform various image transformations on the input
                        image and save them to the output directory
  -bruteLSB             Attempt to brute force any LSB related steganography.
  -colorMap [N [N ...]]
                        Analyze a color map. Optional arguments are colormap
                        indexes to save while searching
  -colorMapRange Start End
                        Analyze a color map. Same as colorMap but implies a
                        range of colorMap values to keep
  -extractLSB           Extract a specific LSB RGB from the image. Use with
                        -red, -green, -blue, and -alpha
  -red index [index ...]
  -green index [index ...]
  -blue index [index ...]
  -alpha index [index ...]
  -extract_frames       Split up an animated gif into individual frames.
  -trailing             Check for trailing data on the given file
  -steghide             Check for StegHide hidden info.

multi options:
  -exif                 Check this file for exif information.
  -xmp                  Check this file for XMP information.
  -carve                Attempt to carve/extract things from this file.

Have a good example? Wish it did something more? Submit a ticket:
https://github.com/bannsec/stegoVeritas

Rate & Review

Great Documentation0
Easy to Use0
Performant0
Highly Customizable0
Bleeding Edge0
Responsive Maintainers0
Poor Documentation0
Hard to Use0
Slow0
Buggy0
Abandoned0
Unwelcoming Community0
100