Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, and stealth payload delivery.
☆26Jun 11, 2025Updated 9 months ago
Alternatives and similar repositories for ImgPayload
Users that are interested in ImgPayload are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 5 months ago
- ☆29Jun 18, 2025Updated 9 months ago
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- ☆18Jun 25, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆43Nov 22, 2025Updated 4 months ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 7 months ago
- Windows Session Hijacking via COM☆341Dec 13, 2025Updated 3 months ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- Vault de Obsidian Apuntes BSCP (Suscribete a Kr4k3nEU chaval)☆21May 31, 2024Updated last year
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Dump processes over WMI with MSFT_MTProcess☆85Feb 13, 2026Updated last month
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 5 months ago
- Secrets Find0r is a multithreaded SMB share crawler that hunts for exposed credentials and secrets across Windows networks. It enumerates…☆68Oct 20, 2025Updated 5 months ago
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆123Jan 29, 2026Updated 2 months ago
- Azure AiTM Function PoC to phish Entra ID Credentials☆28Nov 21, 2025Updated 4 months ago
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- BOF to steal Teams cookies☆129Nov 2, 2025Updated 5 months ago
- Awesome MalDev Links☆52Mar 18, 2026Updated 2 weeks ago
- Detonate malware on VMs and get logs & detection status☆89Mar 17, 2026Updated 2 weeks ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆14Sep 26, 2023Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- DICMA creates massive wordlists based on specific words for password cracking. To do this, it extracts patterns from dictionaries like ro…☆52Aug 16, 2025Updated 7 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆118Mar 8, 2026Updated 3 weeks ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Dec 21, 2024Updated last year
- Payload Obfuscation for Red Teams workshop materials☆83Nov 25, 2025Updated 4 months ago
- ☆19Sep 1, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 9 months ago
- shellcode transformation tool for YARA evasion☆59Dec 17, 2025Updated 3 months ago
- PowerShell script that abuses browser bookmark synchronization as a mechanism for sending and receiving data between systems.☆16Jul 26, 2022Updated 3 years ago
- Pentest automation resources for Burp☆15Mar 10, 2024Updated 2 years ago
- A POC reverse shell that can utilize multiple major web-browsers to provide remote access. Intended to demonstrate remote control of an e…☆13Dec 1, 2016Updated 9 years ago
- Test URL Filtering against a list of sites.☆11Mar 15, 2016Updated 10 years ago
- A curated list of Living off the Land (LOL) methods, tools, and features commonly abused by attackers☆34Mar 27, 2026Updated last week