Advanced Text Steganography & Hidden Payload Forensics Engine
CovertX is an offline text steganography and forensic analysis tool designed to embed, detect, and extract hidden payloads inside seemingly normal text.
It focuses on Unicode-based covert channels that are commonly overlooked by users, platforms, and basic scanners.
Built for:
- Cybersecurity students
- Digital forensics learners
- Red/Blue team experimentation
- Unicode & text-based steganography research
No network access.
No telemetry.
Fully local execution.
- Embed hidden messages into visible text using:
- Unicode Tag Encoding
- Zero-Width (Ghost Protocol) Encoding
- Cover text remains visually unchanged
- Clipboard-safe artifact generation
- Payload size tracking and logging
- Paste text or load UTF-8 files for inspection
- Automatic detection of:
- Unicode Tag–based payloads
- Zero-width character payloads
- Extracts:
- Hidden message
- Encoding method
- Character count
- Matrix-style hex inspector for low-level analysis
- Clean vs infected stream classification
- User provides:
- Visible cover text
- Hidden payload
- Payload is encoded using:
- Private Unicode tag blocks or
- Zero-width binary mapping
- Resulting text appears normal but carries hidden data
- Input text is scanned character-by-character
- Unicode ranges and zero-width characters are analyzed
- If detected:
- Payload is reconstructed
- Method and size are reported
- If clean:
- Text is marked as non-steganographic
- Go to the Releases section of this repository
- Download the latest
CovertX.exe - Place it in a trusted folder
- Run directly — no setup required
No Python installation needed.
git clone https://github.com/BGx-11/CovertX.git
cd CovertX
pip install customtkinter pillow
python covertx.pyRecommended if you want to:
- Modify the code
- Study the steganography logic
- Extend forensic capabilities
CovertX/
├── covertx.py
├── logo.png
├── logo.ico
└── README.md
CovertX is intended strictly for educational and research purposes.
- Do not use this tool to conceal malicious data
- Do not bypass moderation, surveillance, or security systems
- Do not deploy without explicit authorization
The developer is not responsible for misuse or legal consequences.
Licensed under the MIT License.
Developed by BGx-11 (Devansh Agarwal)
Cybersecurity Enthusiast & Developer
“If you can’t see it, it doesn’t mean it isn’t there.”
