Skip to content
/ CovertX Public

A modern text steganography suite utilizing Zero-Width characters and Unicode Tags to embed invisible payloads within standard text, featuring a dedicated GUI for injection and forensic analysis.

Notifications You must be signed in to change notification settings

BGx-11/CovertX

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

🕶️ CovertX

Advanced Text Steganography & Hidden Payload Forensics Engine

Python Platform License

CovertX Logo


Overview

CovertX is an offline text steganography and forensic analysis tool designed to embed, detect, and extract hidden payloads inside seemingly normal text.

It focuses on Unicode-based covert channels that are commonly overlooked by users, platforms, and basic scanners.

Built for:

  • Cybersecurity students
  • Digital forensics learners
  • Red/Blue team experimentation
  • Unicode & text-based steganography research

No network access.
No telemetry.
Fully local execution.


Features

Stealth Injection

  • Embed hidden messages into visible text using:
    • Unicode Tag Encoding
    • Zero-Width (Ghost Protocol) Encoding
  • Cover text remains visually unchanged
  • Clipboard-safe artifact generation
  • Payload size tracking and logging

Forensic Detection

  • Paste text or load UTF-8 files for inspection
  • Automatic detection of:
    • Unicode Tag–based payloads
    • Zero-width character payloads
  • Extracts:
    • Hidden message
    • Encoding method
    • Character count
  • Matrix-style hex inspector for low-level analysis
  • Clean vs infected stream classification

How It Works

Injection Phase

  • User provides:
    • Visible cover text
    • Hidden payload
  • Payload is encoded using:
    • Private Unicode tag blocks or
    • Zero-width binary mapping
  • Resulting text appears normal but carries hidden data

Forensic Phase

  • Input text is scanned character-by-character
  • Unicode ranges and zero-width characters are analyzed
  • If detected:
    • Payload is reconstructed
    • Method and size are reported
  • If clean:
    • Text is marked as non-steganographic

Installation & Download

Option 1: Windows Executable (Recommended for Most Users)

  1. Go to the Releases section of this repository
  2. Download the latest CovertX.exe
  3. Place it in a trusted folder
  4. Run directly — no setup required

No Python installation needed.


Option 2: Run from Source (For Developers)

git clone https://github.com/BGx-11/CovertX.git
cd CovertX
pip install customtkinter pillow
python covertx.py

Recommended if you want to:

  • Modify the code
  • Study the steganography logic
  • Extend forensic capabilities

Project Structure

CovertX/
├── covertx.py
├── logo.png
├── logo.ico
└── README.md

Disclaimer

CovertX is intended strictly for educational and research purposes.

  • Do not use this tool to conceal malicious data
  • Do not bypass moderation, surveillance, or security systems
  • Do not deploy without explicit authorization

The developer is not responsible for misuse or legal consequences.


License

Licensed under the MIT License.


Developed by BGx-11 (Devansh Agarwal)
Cybersecurity Enthusiast & Developer

“If you can’t see it, it doesn’t mean it isn’t there.”

About

A modern text steganography suite utilizing Zero-Width characters and Unicode Tags to embed invisible payloads within standard text, featuring a dedicated GUI for injection and forensic analysis.

Topics

Resources

Stars

Watchers

Forks

Languages