Skip to content

qrxnz/stego-toolkit-nix

Repository files navigation

stego-toolkit-nix

✒️ Description

The finest collection of steganography tools. You like Docker? You love Nix

stego-toolkit-nix is a tool inspired by Dominic Breuker's stego-toolkit. By utilizing nix, stego-toolkit-nix offers greater flexibility, resulting in an improved user experience

📖 Usage

If you have Nix installed with experimental features and flakes support activated, the first step to get started fast just use the following command:

nix flake init -t github:qrxnz/stego-toolkit-nix

In the 'stego-toolkit-nix' directory, use the command nix develop or you can use direnv instead

Done! You can start using the tools. Below you will find a list and instructions

🧰 Tools

Important

New tools will soon be on the list

Basic

Tools Description File types Usage
file Identify file type - file file_name
hexyl A command-line hex viewer - hexyl file_name
ffmpeg FFmpeg is the leading multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter and play pretty much anything that humans and machines have created. Audio / Video / Images ffmpeg -v info -i stego.mp3 -f null - \ read docs for more
steghide Steghide is a steganography program that is able to hide data in various kinds of image and audio files - steghide extract -sf file_name \ read docs for more
exiftool Read, Write and Edit Meta Information - exiftool file_name \ read docs for more
foremost Foremost is a console program to recover files based on their headers, footers, and internal data structures - foremost file_name

Images

Tools Description File types Usage
zteg detect stegano-hidden data in PNG & BMP PNG, BMP zsteg --all file_name
pngcheck Verifies the integrity of PNG, JNG and MNG files PNG, JNG, MNG pngcheck file_name.png
imagemagick Software suite, used for editing and manipulating digital images JPEG, PNG, GIF, TIFF and more read docs

Audio

Tools Description File types Usage
sonic-visualiser Visualisation, analysis, and annotation of music audio recordings Audio read docs

Others

Tools Description File types Usage
Ares Automated decoding of encrypted text without knowing the key or ciphers used - ares -t 'encrypted_text' -d
lemmeknow lemmeknow can be used for identifying mysterious text or to analyze hard-coded strings from captured network packets, malwares, or just about anything - lemmeknow file_name

🗒️ Credits

🎨 Inspiration

I was inspired by:

About

The finest collection of steganography tools. You like Docker? You like Podman? You love Nix <3

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published