Your pip binary might be using a different version of Python.I can't install the tool with pip3, but python 3.6+ is installed $ pip3 install stegcracker -U -force-reinstall If you are running aĭifferent distribution, you can download the rockyou wordlist If you don't specify the wordlist, the tool will try to use theīuilt-in rockyou.txt wordlist which ships with Kali Linux. Optionally pass the path to a wordlist of passwords to try as it's second Using stegcracker is simple, pass a file to it as it's first parameter and Thanks for the support and thank you for building a better version □ Usage So, as a result, after three years of managing the project I've decided to Which (despite being optimized slightly with multiple threads) is just horrible for performance. Started out as a dirty hack for a problem which didn't have any good or easy to use solutions, it'sīiggest limiting factor however is that it relies on just spamming thousand of subprocess calls per second While I've enjoyed building this tool it is and always will built on bad foundations. Stop wasting time and CPU, use stegseek instead! Not convinced? Look at these benchmarks (stolen with love): password Looking for the Docker repository? You can find it here Deprecation Steganography brute-force utility to uncover hidden data inside files.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |