You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- 📏 Message size is limited by the resolution of the input image.
99
+
- 📏 The message size is limited by the input image resolution.
93
100
94
-
-🔓 No encryption is used; the message can be detected with forensic techniques.
101
+
-🎭 The C2 feature is fully simulated and does not perform real-world operations.
95
102
96
-
-🎭 The C2 feature is entirely simulated and does not perform real-world operations.
103
+
-⚙️ To use the steganography dashboard, you need to activate the virtual environment (venv) in the repository and run the backend API server locally before interacting with the website.
97
104
98
-
- ⚙️ To use the steganography panel, you need to activate the virtual environment (venv) in the repository and run the backend API server locally before interacting with the site.
105
+
---
106
+
107
+
## 📜 Tutorial
108
+
I will be showing here a tutorial on how to use the tool efficiently, remembering that at the moment 09/08/2025 the tool runs on the website but with its API connected manually, which in itself is already a great advance compared to the beta version 0.1.0 which did not even have the website.
99
109
110
+
### 1 Step. Fork
111
+
First we will Fork the repository to clone it and run some processes.
When you enter the project, you'll see a certain folder structure. Currently, the site still doesn't run without this user dependency on using the tool without manually starting the API. So, you'll just enter the terminal instead of using any of the folders.
We will see the Link and when we click we will see the API online. Remembering that it is not mandatory to enter the link to see the API status, but for good practice it is good to see it to have confirmation.
Finally, you will enter the website that is available in the repository (Without closing your IDE and your API page) and scrolling down you will reach the panel where we have the options to inject information and extract information.
147
+
First, let's start with the process of injecting information into the image. I'll use one as an example and inform you of the content.
see that we automatically receive a file with a name, when clicking it we will see that the photo is the same, it seems funny but after all the information is hidden in it. Now let's do the opposite process
0 commit comments