abdulkadir-gungor / JPGtoMalwareLinks
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆412Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below
Sorting:
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆508Updated 10 months ago
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆304Updated this week
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆361Updated 2 months ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆171Updated 2 years ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆404Updated 2 months ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆434Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆269Updated 4 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆479Updated 2 months ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆26Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆296Updated 2 years ago
- New Redline Leak☆129Updated 4 years ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆376Updated 4 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆191Updated 6 months ago
- The LockBit builder files☆139Updated last year
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆168Updated 5 months ago
- Spearphishing tools, generate masqueraded pocket executable☆106Updated 2 years ago
- XENA is an innovative C2 made fully in Go. With hacking automation features.☆375Updated 6 months ago
- ☆124Updated last year
- Command & Control-Framework created for collaboration in python3☆317Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆207Updated last year
- A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jam…☆605Updated 3 months ago
- Remote Access Trojan collection.(260+ RAT-Builders!)☆265Updated 3 years ago
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆54Updated 4 years ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆528Updated last year
- Hide your payload into .jpg file☆399Updated 3 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆836Updated last year
- Remote Administration tool for Windows Systems written in pure Python☆134Updated last year
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆663Updated last year
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- An advanced Ransomware written in C++ and fully customizable☆96Updated 2 years ago