abdulkadir-gungor / JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆380Updated 2 years ago
Alternatives and similar repositories for JPGtoMalware:
Users that are interested in JPGtoMalware are comparing it to the libraries listed below
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆155Updated last year
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆444Updated last month
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆334Updated last year
- AV evading OSX Backdoor and Crypter Framework☆278Updated 11 months ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆233Updated 3 years ago
- Remote persistent 🔑Logger for Windows and Linux☆299Updated last year
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆466Updated last year
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆342Updated 4 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆173Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆22Updated last year
- Command & Control-Framework created for collaboration in python3☆316Updated last year
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆347Updated last year
- ☆120Updated 10 months ago
- Ready to go Phishing Platform☆903Updated 6 months ago
- Python AV Evasion Tools☆497Updated this week
- FUD metasploit Persistence RAT☆4Updated last year
- New Redline Leak☆127Updated 4 years ago
- Android remote administration tool☆395Updated this week
- Tool to evade Antivirus With Different Techniques☆167Updated last year
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆514Updated 11 months ago
- POC Pdf-exploit builder on C#☆129Updated 10 months ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆412Updated 6 months ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆767Updated last year
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- The Ultimate URL Masking Tool - An open-source URL masking tool designed to help you Hide Phishing URLs and make them look legit using s…☆249Updated this week
- Remote Access Trojan collection.(260+ RAT-Builders!)☆210Updated 2 years ago
- mip22 is a advanced phishing tool☆612Updated 5 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆403Updated last year
- The LockBit builder files☆92Updated 11 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆276Updated 7 months ago