Red Team Guides
Blue Team GuidesRed Team RecipeDevSecOps Guides
  • Introduction
  • Guides
    • Nix
    • Windows
    • Network
    • Tips and Tricks
    • Tool Syntax
    • Web
    • Databases
    • Programming
    • Wireless
    • Reverse
    • Crypto
    • Steg
    • DevOps
    • Cloud
    • Social Engineering
    • OSINT
    • OT
    • IOT
    • Hardware
    • Physical
  • Scenarios
    • Network Scenarios
    • Web Scenarios
    • Mobile Scenarios
    • Phish Scenarios
    • Physical Scenarios
    • OT Scenarios
  • References
    • References
Powered by GitBook
On this page
  • Steganography
  • Useful websites
  • Extract the file inside the file
  • Extract the file inside the wav file
  • Convert binary codes to qrcode
  • transformations of photos
  • Check the file
  • Guess the password of the file in the file
  1. Guides

Steg

Steganography

Useful websites

Address
Explanation

https://secsy.net/easy_stegoCTF

steganography tools

https://www.branah.com/braille-translator

Braille interpreter

http://bigwww.epfl.ch/demo/ip/demos/FFT/

Decode TTF

https://www.dcode.fr/brainfuck-language

translator brainfuck

https://www.boxentriq.com/code-breaking/morse-code

Morse code translator

https://georgeom.net/StegOnline/image

Display LSB HALF mode

Extract the file inside the file

steghide info <filename> -p <password>
steghide extract -sf <filename> -p <password>

Extract the file inside the wav file

java -jar turgen.jar

Convert binary codes to qrcode

https://www.dcode.fr/binary-image
https://online-barcode-reader.inliteresarchy.com/

transformations of photos

java -jar Stegsolve.jar

Check the file

binwalk -e <file>
strings <file>

Guess the password of the file in the file

./steg_brute.py -b -d /usr/share/wordlists/rockyou.txt -f ../meow.wav

PreviousCryptoNextDevOps

Last updated 1 year ago