╔═════════════════════════════════════════════════════════════════════════════╗
║ ██████╗██╗██████╗ ██╗ ██╗███████╗██████╗ ██████╗ ███████╗ ██████╗║
║ ██╔════╝██║██╔══██╗██║ ██║██╔════╝██╔══██╗ ██╔══██╗██╔════╝██╔════╝║
║ ██║ ██║██████╔╝███████║█████╗ ██████╔╝█████╗██████╔╝█████╗ ██║ ║
║ ██║ ██║██╔═══╝ ██╔══██║██╔══╝ ██╔══██╗╚════╝██╔══██╗██╔══╝ ██║ ║
║ ╚██████╗██║██║ ██║ ██║███████╗██║ ██║ ██║ ██║███████╗╚██████╗║
║ ╚═════╝╚═╝╚═╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ ╚═╝ ╚═╝╚══════╝ ╚═════╝║
╚═════════════════════════════════════════════════════════════════════════════╝
"In the shadows of text, secrets find their home"
Professional steganography suite for ethical hackers and cybersecurity professionals
CIPHER-RECON is a comprehensive digital forensics platform combining cutting-edge steganography with professional tooling. Perfect for penetration testers, security researchers, and red team operations.
- Zero Detection: Advanced techniques that bypass common filters
- Professional UI: Matrix-inspired interface with animations
- Complete Toolkit: CLI + Web + API in one package
- Production Ready: Enterprise security standards
- Extensible: Modular architecture for custom techniques
git clone https://github.com/Skinz1434/CipherRecon.git
cd CipherRecon
npm install
npm start
# Open: http://localhost:3001
Features: Tab navigation, real-time processing, copy-to-clipboard
node src/cli/index.js interactive
Features: Autocomplete, history, color output, professional header
curl -X POST http://localhost:3001/api/encode \
-d '{"message":"secret","carrier":"normal text"}'
Technique | Stealth Level | Capacity | Use Case |
---|---|---|---|
Zero-Width | 🟢🟢🟢🟢🟢 | Unlimited | Covert communications |
Emoji | 🟢🟢🟢🟢⚪ | 1 byte/emoji | Social media channels |
Homoglyphs | 🟢🟢🟢🟢🟢 | Variable | Filter bypass |
Whitespace | 🟢🟢🟢⚪⚪ | Moderate | Code/documents |
Unicode Tags | 🟢🟢🟢🟢🟢 | High | Invisible encoding |
# Hide exfiltration commands in business email
cipher-recon encode "EXFIL_DATABASE_COMPLETE" "Quarterly reports attached as requested"
# Embed C2 server info in social media post
cipher-recon encode "192.168.1.100:4444" "Great weekend plans! 😀🎉🚀"
# Multiple encoding layers for advanced obfuscation
cipher-recon encode "CLASSIFIED" "normal text" | cipher-recon transform base64
# Military-grade obfuscation
cipher-recon transform caesar "OPERATION_BLACKOUT" --shift 13
cipher-recon transform atbash "CONFIDENTIAL_INTEL"
cipher-recon transform vigenere "SECRET_MESSAGE" --key "CIPHER"
# Data format conversions
cipher-recon transform base64 "sensitive_payload"
cipher-recon transform hex "binary_data"
cipher-recon transform binary "ascii_text"
# Bypass visual detection
cipher-recon transform upside-down "hidden_message"
cipher-recon transform zalgo "normal_text"
cipher-recon transform bubble "secret_data"
src/
├── 🖥️ api/ # Express.js REST API with security
├── 💻 cli/ # Commander.js CLI with interactive mode
├── 🌐 web/ # Modern SPA with dark theme
└── 🔗 shared/ # UMD libraries for cross-environment use
- Rate Limiting: 100 requests/15min per IP
- Security Headers: Helmet.js protection
- Input Validation: Joi schema validation
- CORS Control: Whitelist-based access
- Error Handling: Zero information leakage
- Webpack Bundling: 4.23KB minified
- Memory Management: Automatic cleanup
- Async Processing: Non-blocking operations
- Smart Caching: Result optimization
npm run build # Development build with source maps
npm run build:prod # Production build (minified)
npm run build:complete # Full production package
npm run lint # ESLint analysis (0 errors ✅)
npm run format # Prettier formatting
npm test # Comprehensive test suite
npm run serve:web # Development server
npm run serve:dist # Production build server
npm start # API server with web interface
- Node.js: 16.0.0+ (tested up to 22.x)
- Memory: 4GB RAM minimum, 8GB recommended
- Storage: 100MB for installation
- Network: HTTPS support for production
- Chrome: 90+ ✅
- Firefox: 88+ ✅
- Safari: 14+ ✅
- Edge: 90+ ✅
- Startup Time: <2 seconds
- API Response: <100ms average
- Memory Usage: <50MB typical
- Encoding Speed: 10MB/sec
- Penetration testing with written permission
- Security research and education
- Digital forensics investigations
- Red team exercises and training
- Cybersecurity awareness demonstrations
- Unauthorized system access
- Malicious communications
- Privacy violations
- Illegal surveillance
- Any unlawful activities
⚖️ IMPORTANT: Users are solely responsible for compliance with all applicable laws, regulations, and organizational policies.
Built by SkinzAI - Cybersecurity researcher and red team specialist with expertise in:
- Advanced persistent threat simulation
- Digital forensics and incident response
- Steganographic technique development
- Enterprise security architecture
- Red Team Assessments: Advanced threat simulation
- Security Training: Hands-on cybersecurity workshops
- Custom Tool Development: Bespoke security solutions
- Digital Forensics: Expert investigation services