Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and storing them inside images or videos. A lightweight loader retrieves the media file, reconstructs the original binary and executes it in memory. This project highlights unconventional data delivery.
☆165Feb 2, 2026Updated 3 months ago
Alternatives and similar repositories for Malicious-PixelCode
Users that are interested in Malicious-PixelCode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Red Team tools containerized☆76Mar 25, 2026Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆219Mar 7, 2026Updated last month
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- .NET tool used to enrich RPC telemetry☆102Jan 24, 2026Updated 3 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Jul 23, 2025Updated 9 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 8 months ago
- converts sRDI compatible dlls to shellcode☆38Jan 20, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- A small How-To on creating your own weaponized WSL file☆126Jul 23, 2025Updated 9 months ago
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆274Jan 21, 2026Updated 3 months ago
- Ghosting-AMSI☆236Apr 24, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 3 months ago
- Static binary analysis with Detect It Easy — 100% in your browser, no uploads.☆60Feb 10, 2026Updated 2 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆52Dec 7, 2025Updated 4 months ago
- arm64 linux position-independent shellcode framework☆31Dec 12, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 4 months ago
- Enumerate active EDR's on the system☆154Sep 23, 2025Updated 7 months ago
- Convert your shellcode into an ASCII string☆128Jun 27, 2025Updated 10 months ago
- Generate Proxy DLLs in Rust☆51Mar 2, 2026Updated 2 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆95Mar 17, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆160Nov 28, 2025Updated 5 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆152Dec 6, 2025Updated 4 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 3 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆158Jan 25, 2026Updated 3 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated 3 months ago
- ☆85Feb 12, 2026Updated 2 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆232Sep 19, 2025Updated 7 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- A set of tools and resources for analysis of Havoc C2☆28Feb 27, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆118Mar 10, 2026Updated last month
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 4 months ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 5 months ago
- ☆54May 31, 2025Updated 11 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆72Mar 8, 2026Updated last month
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year