Skip to content

Releases: Vyzer9/Steganography-C2

Alpha Version

08 Sep 21:57
3aef630

Choose a tag to compare

🚀 Alpha Version - v1.0-alpha

This is the first alpha release of the Steganography and C2 Tool, marking a major improvement in usability and workflow efficiency.

✅ Key Improvements

🔗 Web Integration with Local API:
The steganography process no longer requires full manual handling.
Users can now simply activate the backend API (uvicorn api.main:app --reload) and perform all actions directly through the web interface.

⚡ Increased Speed & Usability:
The streamlined interaction between the web panel and the backend significantly improves the overall speed and ease of use.

🖼️ Image-based Communication Simplified:
Injecting and extracting hidden messages into/from images can now be done visually through the site — no manual encoding required.

🛠️ In Development

🌐 Auto-Start Backend (Planned):
Future versions will eliminate the need to manually start the API. The backend will launch automatically with the website.

🧪 Reminder

This is an alpha version, meaning bugs may still occur.
Please use it for testing and research purposes only.

What's Changed

  • Docs: Fix cd command in README Usage Instructions by @marlonwq in #1

New Contributors

Full Changelog: v0.1.0-beta...v1.0-alpha

Beta Release - v0.1.0

26 Jul 00:46

Choose a tag to compare

🚀 Beta Release - v0.1.0

This is the first beta version of the C2-Educational-Steganography project.
The goal of this version is to provide a functional foundation for encoding and extracting payloads from images, using security and encryption protocols.

✨ Features

  • Payload Encoder/Decoder:
    Allows embedding and extracting messages from images.
  • Secure Protocol:
    Implementation of secure_encode and secure_decode with encryption (Fernet).
  • Base64 Messages:
    Converts messages to Base64 format for transport.
  • Modular Structure:
    Organized folders: payload_encoder/, payloads/, shared/.

⚠️ Notices

  • This version is still in the testing phase. - Possible bugs in the decode process and the encryption key (Fernet).
  • Do not use in production environments.

🛠 How to run

# Embed
PYTHONPATH=. python3 payload_encoder/output/embed_payload.py

# Extract
PYTHONPATH=. python3 payload_encoder/output/extract_payload_img.py