Stego

GΓΆrsel Stego

steghide extract -sf image.jpg
foremost -i image.png
strings file
exiftool file
binwalk -e file

Photo Forensics: https://29a.ch/photo-forensics/

Aperisolve: https://www.aperisolve.com/

Fotoforensics: https://fotoforensics.com/

Long Images: https://magiceye.ecksdee.co.uk/

Ses Stego

Audio Spectrum: https://academo.org/demos/spectrum-analyzer/

Cipher

Dcode: https://www.dcode.fr

CyberChef: https://gchq.github.io/CyberChef/

Crackstation: https://crackstation.net/

Whitespace Language: https://www.dcode.fr/whitespace-language

Cyber Ninja: https://scwf.dima.ninja/

Javascript Deobfuscate: https://deobfuscate.relative.im/

Decipher: https://decipher.neocities.org/symbols

Forensics

Poweriso: https://www.poweriso.com/

FTK Imager: https://www.exterro.com/digital-forensics-software/ftk-imager

Volatility3: https://github.com/volatilityfoundation/volatility3

python vol.py -f image.dmp windows.info

python vol.py -f image.dmp windows.pslist
python vol.py -f image.dmp windows.psscan
python vol.py -f image.dmp windows.pstree

python vol.py -f image.dmp windows.cmdline

python vol.py -f image.dmp windows.netstat
python vol.py -f image.dmp windows.netscan

python vol.py -f image.dmp windows.dumpfiles ‑‑pid <PID>
python vol.py -f image.dmp -o output windows.memmap --dump ‑‑pid <PID>

Reverse

Deobfuscators: https://github.com/NotPrab/.NET-Deobfuscator

DnSPY (DotNet Debugger): https://github.com/dnSpy/dnSpy

DetectItEasy (File Type Detecter): https://github.com/horsicq/Detect-It-Easy

Last updated