ctf-stego
CTF Steganography
Quick Start — Try These First
# Basic analysis
file image.png
exiftool image.png # EXIF metadata (flags hide here!)
strings image.png | grep -iE "flag|ctf"
binwalk image.png # Embedded files
xxd image.png | tail # Data appended after EOF
# Steganography tools
steghide extract -sf image.jpg # JPEG stego (tries empty password)
steghide extract -sf image.jpg -p "" # Explicit empty password
zsteg image.png # PNG/BMP LSB analysis
stegsolve # Visual bit-plane analysis (GUI)
More from ramzxy/ctf
ctf-osint
Open Source Intelligence techniques for CTF challenges. Use when gathering information from public sources, social media, geolocation, or identifying unknown data.
22ctf-reverse
Reverse engineering techniques for CTF challenges. Use when analyzing binaries, game clients, obfuscated code, or esoteric languages.
20ctf-web
Web exploitation techniques for CTF challenges. Use when solving web security challenges involving XSS, SQLi, CSRF, file upload bypasses, JWT attacks, Web3/blockchain exploits, or other web vulnerabilities.
15ctf-pwn
Binary exploitation (pwn) techniques for CTF challenges. Use when exploiting buffer overflows, format strings, heap vulnerabilities, race conditions, or kernel bugs.
13write-exploit
Write, test, and iterate on CTF exploit scripts. Use when you need to develop a working exploit with a test-debug-fix loop against a live target.
13ctf-malware
Malware and network analysis techniques for CTF challenges. Use when analyzing obfuscated scripts, malicious packages, custom protocols, or C2 traffic.
13