Yet another Stego Tool
$ pip3 install stegoveritas $ stegoveritas_install_deps
stegoveritas_install_deps currently supports: ubuntu, debian, kali, parrotOS, fedora, archlinux and MacOS.
$ sudo docker run -it --rm bannsec/stegoveritas
$ sudo pacman -S stegoveritas
StegoVeritas has default actions for most image types (gif,jpeg,png,tiff,bmp) and will attempt to run on any file.
If you want to do something specific, you can check out the help:
stegoveritas -h usage: stegoveritas [-h] [-out dir] [-debug] [-password PASSWORD] [-wordlist WORDLIST] [-meta] [-imageTransform] [-bruteLSB] [-colorMap [N [N ...]]] [-colorMapRange Start End] [-extractLSB] [-red index [index ...]] [-green index [index ...]] [-blue index [index ...]] [-alpha index [index ...]] [-extract_frames] [-trailing] [-steghide] [-exif] [-xmp] [-carve] [-steghide] file Yet another Stego tool positional arguments: file The file to analyze optional arguments: -h, --help show this help message and exit -out dir Directory to place output in. Defaults to ./results -debug Enable debugging logging. -password PASSWORD When applicable, attempt to use this password to extract data. -wordlist WORDLIST When applicable, attempt to brute force with this wordlist. image options: -meta Check file for metadata information -imageTransform Perform various image transformations on the input image and save them to the output directory -bruteLSB Attempt to brute force any LSB related steganography. -colorMap [N [N ...]] Analyze a color map. Optional arguments are colormap indexes to save while searching -colorMapRange Start End Analyze a color map. Same as colorMap but implies a range of colorMap values to keep -extractLSB Extract a specific LSB RGB from the image. Use with -red, -green, -blue, and -alpha -red index [index ...] -green index [index ...] -blue index [index ...] -alpha index [index ...] -extract_frames Split up an animated gif into individual frames. -trailing Check for trailing data on the given file -steghide Check for StegHide hidden info. multi options: -exif Check this file for exif information. -xmp Check this file for XMP information. -carve Attempt to carve/extract things from this file. Have a good example? Wish it did something more? Submit a ticket: https://github.com/bannsec/stegoVeritas