www.aperisolve.com Open in urlscan Pro
2606:4700:3033::ac43:8ba5  Public Scan

URL: https://www.aperisolve.com/
Submission: On November 19 via api from RU — Scanned from DE

Form analysis 1 forms found in the DOM

<form id="file-upload-form" class="uploader">
  <input id="file-upload" type="file" name="file" accept="image/*">
  <div id="file-drag">
    <img id="file-image" src="#" alt="Preview" class="hidden nofilter">
    <div id="start">
      <i class="fa fa-download" aria-hidden="true"></i>
      <div>Select a file or drag here</div>
      <div id="notimage" class="hidden"></div>
      <span id="file-upload-btn" class="btn btn-primary">Please select an image</span>
    </div>
    <div id="response" class="hidden">
      <div id="messages"></div>
      <progress class="progress" id="file-progress" value="0">
        <span>0</span>% </progress>
    </div>
  </div>
  <button class="btn" id="upload_button" type="button">Submit</button>
  <div id="error" class="error"></div>
</form>

Text Content

Copied to clipboard !
Aperi'Solve
Cheat Sheet
Github
Blog
Twitter




WHAT IS THIS ?

Aperi'Solve is an online platform which performs layer analysis on image. The
platform also uses zsteg, steghide,  outguess, exiftool, binwalk, foremost and
strings for deeper steganography analysis. The platform supports the following
images format: .png, .jpg, .gif, .bmp, .jpeg, .jfif, .jpe, .tiff...

Select a file or drag here

Please select an image

0%
Submit

Extract zsteg files (--extract) ? Disabled
Test all options of zsteg (--all) ? Disabled
I've got a password ! Disabled

$ sudo sh -c "$(curl -fs https://aperisolve.com/install.sh)" &&
aperisolve <file>