Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and storing them inside images or videos. A lightweight loader retrieves the media file, reconstructs the original binary and executes it in memory. This project highlights unconventional data delivery.
☆153Feb 2, 2026Updated last month
Alternatives and similar repositories for Malicious-PixelCode
Users that are interested in Malicious-PixelCode are comparing it to the libraries listed below
Sorting:
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 3 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Red Team tools containerized☆76Dec 6, 2025Updated 2 months ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆211Sep 20, 2025Updated 5 months ago
- Templates for developing your own listeners and agents for AdaptixC2.☆45Updated this week
- Troll TaskManager, and play with it .☆30Aug 3, 2025Updated 7 months ago
- A set of tools and resources for analysis of Havoc C2☆26Feb 27, 2024Updated 2 years ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆27May 13, 2025Updated 9 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- Enumerate active EDR's on the system☆150Sep 23, 2025Updated 5 months ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Jul 23, 2025Updated 7 months ago
- ☆55May 31, 2025Updated 9 months ago
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆249Jan 21, 2026Updated last month
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆25Jan 17, 2026Updated last month
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆92Feb 22, 2026Updated last week
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 6 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆219Oct 28, 2025Updated 4 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 10 months ago
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- LLM agent solving traces, leaderboards, and benchmark results across security CTF and hacking platforms☆48Updated this week
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 2 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- NSecSoftBYOVD POC☆57Feb 12, 2026Updated 3 weeks ago
- Malware AV evasion via disable Windows Defender (Registry). C++☆35Jun 5, 2022Updated 3 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 6 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆50Dec 7, 2025Updated 2 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- ☆38Mar 28, 2025Updated 11 months ago
- Static binary analysis with Detect It Easy — 100% in your browser, no uploads.☆53Feb 10, 2026Updated 3 weeks ago
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- ☆18Sep 1, 2025Updated 6 months ago