File Hider Extractor
Extract hidden files from polyglot carriers. Browser-based binwalk alternative with auto-detect, AES decryption, and visual hex map.
Drop carrier file or click to browse
JPEG, PNG, MP3, PDF, or any file (max 500MB)
jpeg
png
mp3
How to Extract Hidden Files (4 steps)
- Upload a carrier file you suspect contains a hidden payload
- Optionally enter the encryption password
- Click Decode — the tool scans for the EP_STEGO marker and extracts what's inside
- Download the recovered file (or unzip the bundled archive)
Frequently Asked Questions
What does this decoder look for?
It scans the file for the EP_STEGO marker the encoder writes, reads the flags + length, and extracts the payload. It also detects PNG stEG chunks and unwraps Reed-Solomon redundancy when present.
What if no marker is found?
Either the file is clean, or it was hidden with a different tool. Try a different decoder for tools like binwalk-style polyglots that use no marker.
What if the payload looks like noise?
It's probably encrypted. Enter the password used during encoding and try again — wrong passwords return garbage rather than an error.
Does this support multi-file payloads?
Yes. If the encoder bundled multiple files into a ZIP, the decoder unpacks them automatically and lets you download each one.
Is anything uploaded?
No. Decoding is 100% local using ArrayBuffer scanning, JSZip, and the Web Crypto API.