Categories: Kali Linux

Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File Within An Image

Stegify is a Go tool for LSB steganography, capable of hiding any file within an image.

It is a simple command line tool capable of fully transparent hiding any file within an image. This technique is known as LSB (Least Significant Bit)

Install

$ go get -u github.com/DimitarPetrov/stegify

Usage

As a command line tool

$ stegify -op encode -carrier -data -result
$ stegify -op decode -carrier -result

When encoding, the file with name given to flag -data is hidden inside the file with name given to flag -carrier and the resulting file is saved in new file in the current working directory under the name given to flag -result.

The file extension of result file is inherited from the carrier file and must not be specified explicitly in the -result flag.

When decoding, given a file name of a carrier file with previously encoded data in it, the data is extracted and saved in new file in the current working directory under the name given to flag -result.

The result file won’t have any file extension and therefore it should be specified explicitly in -result flag.

In both cases the flag -result could be omitted and it will be used the default file name: result

Programmatically in your code

stegify can be used programmatically too and it provides easy to use functions working with file names or raw Readers and Writers. You can visit godoc under steg package for details.

Demonstration

Carrier
Data
Result

The Result file contains the Data file hidden in it. And as you can see it is fully transparent.

Disclaimer

If carrier file is in jpeg or jpg format, after encoding the result file image will be png encoded (therefore it may be bigger in size) despite of file extension inherited from the original carrier file (which is .jpeg or .jpg).

R K

Recent Posts

Useful Bug Bounty And Security Related Write-ups : A Comprehensive Guide For Enthusiasts

This repo contains all variants of information security & Bug bounty & Penetration Testing write-up…

5 hours ago

Admin-Panel-Dorks : Mastering Google Dorks To Uncover Hidden Admin Panels

site:*/sign-in site:*/account/login site:*/forum/ucp.php?mode=login inurl:memberlist.php?mode=viewprofile intitle:"EdgeOS" intext:"Please login" inurl:user_login.php intitle:"Web Management Login" site:*/users/login_form site:*/access/unauthenticated site:account.*.*/login site:admin.*.com/signin/…

5 hours ago

Conduwuit : Pioneering A New Era In Matrix Homeservers

Matrix is an open network for secure and decentralized communication. Users from every Matrix homeserver…

5 hours ago

LSMS – Linux Security And Monitoring Scripts

Linux Security And Monitoring Scripts are a collection of security and monitoring scripts you can…

5 hours ago

Fiber – Using Fibers To Run In-Memory Code

A fiber is a unit of execution that must be manually scheduled by the application…

5 hours ago

XSS-Exploitation-Tool : A Penetration Testing Tool

XSS Exploitation Tool is a penetration testing tool that focuses on the exploit of Cross-Site…

5 hours ago