OsandaMalith / Exe2Image
A simple utility to convert EXE files to JPEG images and vice versa.
☆200Updated 9 years ago
Alternatives and similar repositories for Exe2Image
Users that are interested in Exe2Image are comparing it to the libraries listed below
Sorting:
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆290Updated 7 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- Invokes a Windows Security Login Prompt and outputs the clear text password.☆175Updated 8 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆248Updated last year
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- Exploitkit☆184Updated 8 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- Pythonic ransomware proof of concept.☆219Updated 5 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆296Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- An open source RansomWare☆87Updated 5 years ago
- Collection of social engineering payloads☆296Updated 7 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆269Updated last year
- IP obfuscator made to make a malicious ip a bit cuter☆546Updated 7 months ago
- Avoidz tool to bypass most A.V softwares☆139Updated 7 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 4 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- ARCANUS is a customized payload generator/handler.☆144Updated 7 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆342Updated 4 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆186Updated 6 years ago
- ☆101Updated 7 years ago
- An Advanced C# .NET Rat, It’s Stable and Contains Many Features.☆269Updated 7 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆500Updated 5 years ago
- Collection of Remote Administration Tool samples☆258Updated 10 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆317Updated 6 years ago