

- #EXIFTOOL KALI INSTALL PDF#
- #EXIFTOOL KALI INSTALL INSTALL#
- #EXIFTOOL KALI INSTALL ARCHIVE#
- #EXIFTOOL KALI INSTALL DOWNLOAD#
The information recorded in EXIF is shutter speed, date and time, aperture, ISO, and even GPS coordinates. If that file is deleted, wholeaked won’t be able to compare the signatures.All modern digital cameras (including the one on your phone) record EXIF data when capturing an image. Important: You shouldn’t delete the project_folder/db.csv file if you want to use the file validation feature. wholeaked -n test_project -f secret.pdf -validate wholeaked will compare the signatures detected in the file and the database located in the project folder. You can use the -validate flag to reveal the owner of a leaked file. wholeaked -n test_project -f secret.pdf -t targets.txt -sendgrid Validating a Leaked File To specify the sending method, you can use -sendgrid, -ses or -smtp flags.
#EXIFTOOL KALI INSTALL INSTALL#

wholeaked -n test_project -f secret.pdf -t targets.txt Wholeaked requires a project name -n, the path of the base file which the signatures will add -f and a list of target recipients -tĮxample command.
#EXIFTOOL KALI INSTALL ARCHIVE#
#EXIFTOOL KALI INSTALL DOWNLOAD#
Download “Xpdf command line tools” for Linux, macOS or Windows from here:.If you don’t want to use this feature, you don’t need to install it.
#EXIFTOOL KALI INSTALL PDF#
Wholeaked requires pdftotext for verifying watermarks inside PDF files. Windows: Download exiftool from here and put the exiftool.exe in the same directory with wholeaked.Debian-based Linux: Run apt install exiftool.Wholeaked requires exiftool for adding signatures to metadata section of files. You can download the pre-built binaries from the releases page and run. Watermark: An invisible signature is inserted into the text. Supported file types: PDF, DOCX, XLSX, PPTX, MOV, JPG, PNG, GIF, EPS, AI, PSD Metadata: The signature is added to a metadata section of a file. All file types are supported.īinary: The signature is directly added to the binary. Available detection modes are given below:įile Hash: SHA256 hash of the file. Wholeaked can add the unique signature to different sections of a file. To find who leaked the document, you just need to provide the leaked file to wholeaked, and it will reveal the responsible person by comparing the signatures in the database.
