Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and storing them inside images or videos. A lightweight loader retrieves the media file, reconstructs the original binary and executes it in memory. This project highlights unconventional data delivery.
☆164Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for Malicious-PixelCode
Users that are interested in Malicious-PixelCode are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Red Team tools containerized☆76Mar 25, 2026Updated 2 weeks ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆216Mar 7, 2026Updated last month
- Find kernel32 base and API addresses. Simple C++ implementation☆23Apr 7, 2022Updated 4 years ago
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated 2 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Jul 23, 2025Updated 8 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 8 months ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 5 months ago
- Ransomware for demonstration☆19Feb 28, 2023Updated 3 years ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 7 months ago
- converts sRDI compatible dlls to shellcode☆35Jan 20, 2025Updated last year
- process hollowing variant using NtCreateSection + NtMapViewOfSection + ResumeThread☆31Jan 9, 2022Updated 4 years ago
- AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)☆268Jan 21, 2026Updated 2 months ago
- A small How-To on creating your own weaponized WSL file☆125Jul 23, 2025Updated 8 months ago
- Ghosting-AMSI☆234Apr 24, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- Static binary analysis with Detect It Easy — 100% in your browser, no uploads.☆57Feb 10, 2026Updated 2 months ago
- Clipboard for Command and Control between VDI, RDP and Others on Windows☆52Dec 7, 2025Updated 4 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- arm64 linux position-independent shellcode framework☆30Dec 12, 2025Updated 4 months ago
- Enumerate active EDR's on the system☆152Sep 23, 2025Updated 6 months ago
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 9 months ago
- Generate Proxy DLLs in Rust☆50Mar 2, 2026Updated last month
- This repo contains useful scripts that AI created for me which I would have been too lazy for☆95Mar 17, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Automatically scan the file system to identify Electron applications vulnerable to ASAR tampering.☆159Nov 28, 2025Updated 4 months ago
- Using Chromium-based browsers as a proxy for C2 traffic.☆150Dec 6, 2025Updated 4 months ago
- A C# tool for extracting information from SCCM PXE boot media.☆52Jan 14, 2026Updated 3 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆153Jan 25, 2026Updated 2 months ago
- Network Fuzzing Framework☆64Jan 17, 2026Updated 2 months ago
- ☆84Feb 12, 2026Updated 2 months ago
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆232Sep 19, 2025Updated 6 months ago
- Attempting to Hook LSASS APIs to Retrieve Plaintext Credentials☆61May 12, 2025Updated 11 months ago
- A set of tools and resources for analysis of Havoc C2☆28Feb 27, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Microsoft Network Service Fingerprinting Tool☆69Jan 2, 2026Updated 3 months ago
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆113Mar 10, 2026Updated last month
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Laravel RCE Exploitation Toolkit☆57Nov 8, 2025Updated 5 months ago
- open source port/reimplementation of the Cobalt Strike BOF Loader as is☆71Mar 8, 2026Updated last month
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detections☆47Jan 28, 2026Updated 2 months ago
- ☆55May 31, 2025Updated 10 months ago