Steganography ctf tools by Avi..... Disclaimer : I have collected the following information from different sites, some youtube channels just to done things quickly during steg ctf challenges. @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ file command eog command strings <imagename> | grep -i flag exiftool <image_name> apt-get install exif Now decode the hex using the cyber chef tool or you can use the built-in python tool as described below image. ****************************************************************** exiv2 command ****************************************************************** Binwalk command : binwalk <image_name> binwalk -e <image_name> -e for extract Using this tool, you can check whether there is a hidden archive data on that image or not. How to extract archive data using binwalk. binwalk -dd=”.*” <image_name> binwalk -M -dd=”.*” <image_name> after extraction, it saves under _StegPuzzle3.jpg.extracted dire