Bash script to extract hidden files and strings from images.
Stegextract extracts any trailing data after the image's closing bytes, and any hidden files (or other images) embedded within the image.
Short byte combinations such as JPEG's FFD8 FFE0
might sometimes create false positives.
Manually reviewing the hexdump is sometimes inevitable in cases of highly complex embedded files.
Stegextract is not the solution for any color/pixel/filter/LSB related Steganography, nor does it try to be. It
relies on magic numbers, hexdumps and binary data alone.
Currently supports PNG, JPG, and GIF.
Update: --analyze
flag was deprecated and is now being performed automatically with every scan.
sudo sh -c 'curl https://raw.githubusercontent.com/evyatarmeged/stegextract/master/stegextract > /usr/local/bin/stegextract'
sudo chmod +x /usr/local/bin/stegextract
Usage: stegextract <file> [options]
-h, --help Print this and exit
-o, --outfile Specify an outfile
-s, --strings Extract strings from file
-q, --quiet Do not output to stdout
--force-format Force this image format instead of detecting
Image examples from the above GIF can be found in the examples folder.