Screenshots
Example Usage
# 1. Hide a file inside an image (AES-256-GCM encrypted, auto-method) stegoforge encode -c photo.png -p secret.pdf -k "my-pass" # 2. Retrieve the hidden file stegoforge decode -f photo_stego.png -k "my-pass" # 3. CTF one-click forensic dump on any suspicious file stegoforge ctf -f suspicious.mp3 # 4. Compare original vs stego — pixel heatmap stegoforge diff -c photo.png -s photo_stego.png # 5. Batch embed a secret into every carrier in a folder stegoforge batch -d ./carriers/ -p secret.txt -k "my-pass" # 6. Check capacity and stealth score of a carrier stegoforge capacity -c photo.png --depth 2 # 7. Simulate Twitter recompression and test payload survives stegoforge encode -c photo.png -p secret.txt -k "my-pass" --target twitter --test-survival # 8. Launch the local web UI (no data ever leaves your machine) stegoforge web # Install tab-completion (bash) eval "$(stegoforge completion bash)" # Use env var to avoid key in shell history export STEGOFORGE_KEY="my-pass" stegoforge decode -f stego.png # key read from env