Skip to content

Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.

License

Notifications You must be signed in to change notification settings

xakepnz/GREENWHISPER

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GREENWHISPER

Description:

This is a simple shell script that extracts certain strings from a file, these could be hidden encoded messages in a jpg, to IPV4 addresses from an ELF, I decided to create this to save a lot of time when attempting Steganography challenges.

[ ] Author: xakep
[ ] Language: Bash
[ ] OS: Linux

HTTP Extraction:

alt text

MD5 Extraction: - https://i.imgur.com/9rxJEaQ.gif

Requirements:

[ ] strings
[ ] xxd
[ ] egrep
[ ] exiftool

Searches for:

[ ] IPV4 Addresses
[ ] MD5 Hashes
[ ] HTTP/HTTPS/FTP URL's
[ ] Bitcoin Addresses
[ ] Email Addresses
[ ] ASCII Words, such as domains/hostnames/words in general
[ ] Base64 Encoded strings
[ ] An array of integers
[ ] Binary strings

Creates:

[ ] Exif data pulled from the file
[ ] Hex dump of the file for manual analysis
[ ] Determines what type of file it is

Install:

$ git clone https://github.com/xakepnz/GREENWHISPER.git
$ cd GREENWHISPER
$ chmod  x greenwhisper

Debian/Ubuntu Install:

$ git clone https://github.com/xakepnz/GREENWHISPER.git
$ cd GREENWHISPER
$ chmod  x greenwhisper && chmod  x install.sh
$ ./install.sh

Usage:

$ ./greenwhisper my-file.jpg

Optional:

$ sudo cp greenwhisper /bin/
$ greenwhisper /steg-challenges/hidden.png

About

Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages