abdulkadir-gungor / JPGtoMalwareLinks
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆400Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below
Sorting:
- AV evading OSX Backdoor and Crypter Framework☆288Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆477Updated 6 months ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆163Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆261Updated 4 years ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆352Updated last year
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆429Updated 11 months ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆386Updated last year
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆359Updated 4 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆26Updated last year
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆187Updated last month
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆478Updated last year
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆812Updated last year
- An advanced Ransomware written in C++ and fully customizable☆92Updated last year
- Command & Control-Framework created for collaboration in python3☆318Updated last year
- New Redline Leak☆128Updated 4 years ago
- ☆122Updated last year
- Remote Access Trojan collection.(260+ RAT-Builders!)☆240Updated 3 years ago
- Stealer written on C#, logs will be sent to Telegram bot.☆471Updated 4 months ago
- Python AV Evasion Tools☆515Updated 5 months ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆54Updated 4 years ago
- Remote persistent 🔑Logger for Windows and Linux☆299Updated 2 years ago
- The LockBit builder files☆122Updated last year
- Automated exploit scanner for cameras on the internet☆195Updated last year
- Spearphishing tools, generate masqueraded pocket executable☆100Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆305Updated 6 months ago
- KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detecti…☆359Updated last year
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- A Windows Botnet written in Golang☆89Updated last year
- Remcos Professional Cracked By Alcatraz3222-Remote Administration Trojan-RAT☆111Updated 11 months ago