Metadata-Version: 2.4
Name: stegcracker
Version: 2.1.0
Summary: Steganography brute-force utility to uncover hidden data inside files.
Home-page: https://github.com/Paradoxis/StegCracker
Author: Luke Paris (Paradoxis)
Author-email: luke@paradoxis.nl
License: MIT
Classifier: License :: OSI Approved :: MIT License
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Programming Language :: Python :: Implementation :: PyPy
Requires-Python: >=3.6.0
Description-Content-Type: text/markdown
License-File: LICENSE.md
Provides-Extra: test
Requires-Dist: coverage; extra == "test"
Requires-Dist: codecov; extra == "test"
Provides-Extra: dev
Requires-Dist: twine; extra == "dev"
Requires-Dist: wheel; extra == "dev"
Requires-Dist: setuptools>=40.6.3; extra == "dev"
Dynamic: author
Dynamic: author-email
Dynamic: classifier
Dynamic: description
Dynamic: description-content-type
Dynamic: home-page
Dynamic: license
Dynamic: license-file
Dynamic: provides-extra
Dynamic: requires-python
Dynamic: summary

# StegCracker
[![Build Status](https://travis-ci.org/Paradoxis/StegCracker.svg?branch=master)](https://travis-ci.org/Paradoxis/StegCracker)
[![PyPI version](https://badge.fury.io/py/stegcracker.svg)](https://badge.fury.io/py/stegcracker)
[![codecov](https://codecov.io/gh/Paradoxis/StegCracker/branch/master/graph/badge.svg)](https://codecov.io/gh/Paradoxis/StegCracker)
[![pulls](https://img.shields.io/docker/pulls/paradoxis/stegcracker.svg)](https://hub.docker.com/r/paradoxis/stegcracker)

Steganography brute-force utility to uncover hidden data inside files. <br>
Looking for the Docker repository? You can find it [here](https://hub.docker.com/r/paradoxis/stegcracker)

## Deprecation
Stop wasting time and CPU, use [stegseek](https://github.com/RickdeJager/stegseek) instead! Not convinced? Look at these benchmarks (stolen with love):

| password    | Line        | Stegseek v0.4 | Stegcracker 2.0.9 | Stegbrute v0.1.1 (-t 8) |
|-------------|-------------|---------------|-------------------|-------------------------|
| "cassandra" | 1 000       |          0.9s |              3.1s |                    0.7s |
| "kupal"     | 10 000      |          0.9s |             14.4s |                    7.1s |
| "sagar"     | 100 000     |          0.9s |           2m23.0s |                 1m21.9s |
| "budakid1"  | 1 000 000   |          0.9s | [p]      23m50.0s |                13m45.7s |
| "␣␣␣␣␣␣␣1"  | 14 344 383  |          1.9s | [p]    5h41m52.5s | [p]          3h17m38.0s |

While I've enjoyed building this tool it is and always will built on bad foundations. StegCracker
started out as a dirty hack for a problem which didn't have any good or easy to use solutions, it's 
biggest limiting factor however is that it relies on just spamming thousand of subprocess calls a second
which (despite being optimized slightly with multiple threads) is just horrible for performance.

So, as a result, after three years of managing the project I've decided to
[pass on the torch](https://github.com/RickdeJager/stegseek/issues/4) and officially
retire the project. Thanks for the support and thank you [@RickdeJager](https://github.com/RickdeJager) for building a better version :tada:

## Usage
Using stegcracker is simple, pass a file to it as it's first parameter and 
optionally pass the path to a wordlist of passwords to try as it's second 
parameter. If you don't specify the wordlist, the tool will try to use the 
built-in rockyou.txt wordlist which ships with Kali Linux. If you are running a 
different distribution, you can download the rockyou wordlist 
[here](https://github.com/danielmiessler/SecLists/raw/master/Passwords/Leaked-Databases/rockyou.txt.tar.gz).

```
$ stegcracker <file> [<wordlist>]
```

Or using Docker:

```
$ docker run -v $(pwd)/data/:/data -it paradoxis/stegcracker example.jpg
```

## Requirements
The program requires the steghide binary, and Python 3.6 or higher to be installed. If 
python 3.6 is not installed, check out [this](https://unix.stackexchange.com/questions/332641/how-to-install-python-3-6)
guide on how to do so. Steghide can be installed by using the following command (Kali Linux):

```
$ sudo apt-get install steghide -y
```

## Installation
To install StegCracker, run the following command:

```
$ pip3 install stegcracker
```

Or pull the latest docker image:

```
$ docker pull paradoxis/stegcracker
```

## Updating
To update StegCracker, simply pass `-U` to the installation command:

```
$ pip3 install stegcracker -U --force-reinstall
```

## Example

![demo](https://github.com/Paradoxis/StegCracker/raw/master/stegcracker.gif)
 
## FAQ / Troubleshooting

* I can't install the tool with `pip3`, but python 3.6+ is installed
    * Your pip binary might be using a different version of Python. Try installing it 
      directly through Python like so (replace "X" with your minor version, eg: `python3.6`): 
      `python3.X -m pip install -U stegcracker`
      
* I installed the tool, but when I run `stegcracker` it just returns 'command not found'
    * Chances are your Python's `bin` directory is not in your PATH envrionment variable. 
      As a dirty fix you could add the following to your `~/.bashrc` file: `alias stegcracker='python3 -m stegcracker'`

* I'm using StegCracker 1.X, how do I upgrade?
    * If you're upgrading StegCracker from the original 1.X release, please 
      remove the existing version first using: `sudo rm --force $(which stegcracker)`

* I want to run an older version of StegCracker, how do I obtain a copy?
    * While I recommended using the latest and greatest version, you might want 
      to install an older version of StegCracker. You can do this
      by checking out the [releases](https://github.com/Paradoxis/StegCracker/releases) 
      page. _(Note: all issues or pull requests regarding this version will be be ignored)_.

* Can I run this tool on other Linux distro's? 
    * As long as you have a valid version of Python 3.6 and steghide in your path
      it *should* work. Please note that the tool has officially been tested on 
      Kali Linux, all other platforms might be unstable. If you find a bug on 
      another distro, please submit an issue and I'll see what I can do 
      _(but do fill in the template as well)_.
      
* Can I run StegCracker on Windows?
    * As far as I know there aren't any official steghide releases for Windows, 
    so as far as I'm aware: no

## License
Copyright 2020 - Luke Paris (Paradoxis)

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, 
including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to 
do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF 
OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
