StegoHunt

StegoHunt is an industry-leading software tool, comprising the StegoAnalyst and StegoBreak tools, which can be used to discover the presence of hidden data activity in files and applications.

  • Quickly identify data obfuscation activity in an investigation by scanning files, captured memory images, and, for active systems, active processes;
  • Find evidence of steganography programs using YARA WetStone rules and hash sets provided in the monthly dataset releases;
  • Identify suspicious carrier files by detecting program data, signatures, and structural and static anomalies;
  • Use multiple operational discovery modes for transport file discovery, including directories, drives, files, and drive images;
  • Relate and capture evidence for presentations to management or the court.


Main features

Detecção de Esteganografia
Análise de Imagens
Extração de Dados Ocultos
Relatórios de Segurança
Interface Intuitiva

Full description

Request a quote

Why StegoHunt?

Cybercriminals are becoming increasingly adept at covering their tracks and hiding incriminating data. With more than 1,000 known methods for hiding data in images, audio files, digital video, network protocols, and other digital media, uncovering these methods and artifacts has never been more important. Recently, malware developers have integrated the ability to hide data into malicious code to create advanced persistent threats.

With this comprehensive suite of technologies, investigators, corporate auditors, incident responders, white-collar crime teams, and data loss prevention users can quickly identify whether steganography is present in active cases or in the workplace.

StegoBreak opens and extracts streaming payloads from payload files with a simple click-and-bridge interface. Find popular password dictionaries included to perform a dictionary attack and easily incorporate other dictionaries, as well as create your own to extend your dictionary attacks.

The StegoAnalyst tool provides in-depth analysis of locked images and audio files. Use the file preview panel to view individual attributes (image details, DCT coefficients, core pairs). This allows for a comprehensive analysis of identified vehicles. Several filter options are available for further analysis, such as the Least Significant Bit (LSB) of specific cores.

Quickly identify if steganography is present in your investigations by scanning over 1,000 applications that hide data threats using Fibonacci search methods (desktop applications, smart mobile applications, server-based applications, source code)

Find suspicious files that would otherwise go unnoticed (program artifacts, program signatures, statistical anomalies)

Generate specific reports for case management or court presentation.

Operational discovery modes (directory, drive, files, drive image, network path, live machine)

System Requirements

  • To support StegoHunt, a computer system must meet or exceed the following minimum requirements:
  • Microsoft Windows 2000, Windows XP, Windows Vista, Windows 2003 Server, Windows 7, Windows 8, Windows 2008 Server
  • 1 GB of RAM
  • 1 GHz Pentium processor or higher


Request a quote

By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Privacy Policy and Terms of Use

Related products

Web Application Perimeter Monitoring

With SolarWinds IP Address Manager (IPAM), you can ditch those outdated spreadsheets and hassles once and for all, and opt for the reliability and scalability of a consolidated, automated IP address, DNS, and DHCP management solution.

IP address management software designed to save time and avoid costly mistakes

Main features

  • Automated IP address tracking;
  • Integrated management of DHCP, DNS and IP addresses;
  • Alerts, troubleshooting, and IP address reporting;
  • Multi-vendor DHCP and DNS support on-premises and in the cloud;
  • IP request form to simplify and automate IP address requests;
  • API support for CRUD operations to provide two-way integration with third-party software.


DameWare Remote Support enables fast and easy remote access to Windows, Linux, and Mac OS X desktops, laptops, and servers. Support thousands of end users without leaving your desk and save time completing administration tasks remotely.

Main features

  • Fast and secure remote control;
  • Remote assistance anytime, anywhere;
  • Simplify Windows management;
  • Integrated remote administration tools;
  • Offer remote support from iOS and Android devices;
  • Remotely manage Active Directory environments.


By clicking "Submit," you agree to allow Software.com.br to contact you using the information provided to send quotes and communications related to your order. For more details on how we protect and use your data, please see our Privacy Policy. Privacy Policy and Terms of Use

en_US