To find who leaked the document, you just need to provide the leaked file to wholeaked and it will reveal the responsible person by comparing the signatures in the database.
56
+
To find who leaked the document, you just need to provide the leaked file to wholeaked, and it will reveal the responsible person by comparing the signatures in the database.
57
57
58
58
```
59
59
+-----------+ +---------+
skipped 18 lines
78
78
79
79
**File Hash:** SHA256 hash of the file. All file types are supported.
80
80
81
-
**Binary:** The signature is directly added to the binary. *Almost* all filetypes are supported.
81
+
**Binary:** The signature is directly added to the binary. *Almost* all filetypes are supported.
82
82
83
83
**Metadata:** The signature is added to a metadata section of a file. Supported file types: PDF, DOCX, XLSX, PPTX, MOV, JPG, PNG, GIF, EPS, AI, PSD
84
84
85
-
**Watermark:** An invisible signature is inserted to the text. Only PDF files are supported.
85
+
**Watermark:** An invisible signature is inserted into the text. Only PDF files are supported.
86
86
87
87
# Installation
88
88
skipped 30 lines
119
119
120
120
## Basic Usage
121
121
122
-
wholeaked requires a project name `-n`, path of the base file which the signatures will added `-f` and a list of target recipients `-t`
122
+
wholeaked requires a project name `-n`, thepath of the base file which the signatures will add `-f` and a list of target recipients `-t`
123
123
124
124
Example command: `./wholeaked -n test_project -f secret.pdf -t targets.txt`