Skip to content

xakepnz/GREENWHISPER

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GREENWHISPER

Description:

This is a simple shell script that extracts certain strings from a file, these could be hidden encoded messages in a jpg, to IPV4 addresses from an ELF, I decided to create this to save a lot of time when attempting Steganography challenges.

[+] Author: xakep
[+] Language: Bash
[+] OS: Linux

HTTP Extraction:

alt text

MD5 Extraction: - https://i.imgur.com/9rxJEaQ.gif

Requirements:

[+] strings
[+] xxd
[+] egrep
[+] exiftool

Searches for:

[+] IPV4 Addresses
[+] MD5 Hashes
[+] HTTP/HTTPS/FTP URL's
[+] Bitcoin Addresses
[+] Email Addresses
[+] ASCII Words, such as domains/hostnames/words in general
[+] Base64 Encoded strings
[+] An array of integers
[+] Binary strings

Creates:

[+] Exif data pulled from the file
[+] Hex dump of the file for manual analysis
[+] Determines what type of file it is

Install:

$ git clone https://github.com/xakepnz/GREENWHISPER.git
$ cd GREENWHISPER
$ chmod +x greenwhisper

Debian/Ubuntu Install:

$ git clone https://github.com/xakepnz/GREENWHISPER.git
$ cd GREENWHISPER
$ chmod +x greenwhisper && chmod +x install.sh
$ ./install.sh

Usage:

$ ./greenwhisper my-file.jpg

Optional:

$ sudo cp greenwhisper /bin/
$ greenwhisper /steg-challenges/hidden.png

About

Simple script that checks to see if there are any hidden/encoded strings in a file, useful for Steganography challenges.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages