abdulkadir-gungor / JPGtoMalwareView external linksLinks
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆418Jun 17, 2022Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below
Sorting:
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Jun 20, 2022Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18May 23, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Jun 18, 2022Updated 3 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆138Oct 3, 2023Updated 2 years ago
- H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through th…☆281Jul 21, 2024Updated last year
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆501Jan 10, 2023Updated 3 years ago
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- UAC bypass for x64 Windows 7 - 11☆831Feb 2, 2026Updated 2 weeks ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆110Feb 2, 2026Updated 2 weeks ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆104Sep 19, 2024Updated last year
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,366Oct 27, 2023Updated 2 years ago
- A Bumblebee-inspired Crypter☆79Dec 5, 2022Updated 3 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Sep 15, 2022Updated 3 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆934Mar 29, 2022Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- Nidhogg is an all-in-one simple to use windows kernel rootkit.☆2,235Updated this week
- XLL Phishing Tradecraft☆438May 24, 2022Updated 3 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆648Apr 3, 2022Updated 3 years ago
- Shellcodev is a tool designed to help and automate the process of shellcode creation.☆112Oct 11, 2023Updated 2 years ago
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,232Aug 18, 2023Updated 2 years ago
- ☆133Oct 14, 2022Updated 3 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,495Dec 21, 2023Updated 2 years ago
- Persistence by writing/reading shellcode from Event Log☆378May 27, 2022Updated 3 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆605Mar 19, 2022Updated 3 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,470Aug 18, 2023Updated 2 years ago
- It bridges my research with a functional tool. I want to provide a safe, open-source framework for hackers to test evasion and for defend…☆280Jan 26, 2026Updated 3 weeks ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆103May 11, 2022Updated 3 years ago
- Aggressorscript that turns the headless aggressor client into a (mostly) functional cobalt strike client.☆148Sep 8, 2022Updated 3 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆401Jun 19, 2023Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆938Nov 12, 2022Updated 3 years ago
- Convert shellcode into different formats!☆358Jan 24, 2023Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,600Nov 14, 2025Updated 3 months ago
- A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities.☆460Mar 25, 2024Updated last year