
I built a rich terminal interface for steganography and digital forensics (Offline ML, Batch Processing, Zero-Dependency)
Hey r/tui,
Most security and digital forensics tools have notoriously awful command-line interfaces—usually just massive walls of unformatted text or obscure flags. I wanted to build a hacking toolkit that actually looks and feels modern in the terminal.
I just released v1.1.0 of StegoForge, a natively compiled, zero-dependency CLI engine for hiding AES-encrypted payloads inside media files (images, audio, video) and hunting them down.
The TUI & CLI Experience:
- Powered by Rich: The entire terminal output is heavily styled, featuring live progress bars for the new mass batch-injection command (
stegoforge batch), formatted tables for forensic results, and clean error handling. - Intelligent CLI Steering: If you try to embed a payload that is too large for the carrier file, the CLI doesn't just crash. It calculates the exact byte deficit and prints precise
--depthflag suggestions to fix it. - Automated CTF Gauntlet: Running
stegoforge ctf --file target.pngtriggers a highly visual, step-by-step terminal readout as it runs RS Analysis, Chi-square, and offline HuggingFace ML models (ONNX) to blindly extract payloads.
Even though it's a terminal tool, I recently added a visual diff engine. Running stegoforge diff will analyze a manipulated file and output an amplified graphical heatmap of the altered pixels directly to your directory.
I packaged the entire Python engine into standalone executables (Windows/Linux/Mac) so you can run it purely from the command line without fighting dependency hell.
🔗 GitHub Repository:https://github.com/Nour833/StegoForge
I would love to hear your thoughts on the CLI architecture, the formatting, or what terminal features I should add next!