It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆423Jun 17, 2022Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆146Jun 20, 2022Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- Argus Advanced Remote & Local Keylogger For macOS and Windows☆140Oct 3, 2023Updated 2 years ago
- H.I.V.E is an automated OSINT (Open Source Intelligence) multi-tool that enables efficient data gathering from various sources through th…☆301Jul 21, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- A Bumblebee-inspired Crypter☆80Dec 5, 2022Updated 3 years ago
- ⚡ Create infinite UAC prompts forcing a user to run as admin ⚡☆248Sep 23, 2022Updated 3 years ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- Based on the Shodan API, it displays the open ports and security vulnerabilities of the server related to the entered ip or hostname.☆15Apr 17, 2021Updated 4 years ago
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆500Jan 10, 2023Updated 3 years ago
- UAC bypass for x64 Windows 7 - 11☆836Feb 2, 2026Updated last month
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆111Feb 2, 2026Updated last month
- Metasploit Multi Purpose Exploiting Toolkit For Termux☆32Sep 23, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.☆783Jun 23, 2023Updated 2 years ago
- Dump place details from Google Maps like phone,email,website,and reviews☆73Jun 3, 2025Updated 9 months ago
- Cobalt Strike External C2 Integration With Azure Servicebus, C2 traffic via Azure Servicebus☆247Feb 23, 2022Updated 4 years ago
- Windows Local Privilege Escalation via CdpSvc service (Writeable SYSTEM path Dll Hijacking)☆254Sep 15, 2022Updated 3 years ago
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆135May 25, 2023Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation.☆942Mar 29, 2022Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆83Aug 15, 2023Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆1,472Aug 18, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆1,228Aug 18, 2023Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆29Nov 30, 2023Updated 2 years ago
- Find Microsoft Exchange instance for a given domain and identify the exact version☆189Jan 30, 2023Updated 3 years ago
- A PoC that combines AutodialDLL lateral movement technique and SSP to scrape NTLM hashes from LSASS process.☆303Oct 26, 2022Updated 3 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆570Mar 28, 2024Updated 2 years ago
- This script will you help to find the information about the website and to help in penetrating testing☆114Sep 27, 2025Updated 6 months ago
- XLL Phishing Tradecraft☆440May 24, 2022Updated 3 years ago
- A powerful reverse shell generator☆46Mar 18, 2026Updated last week
- A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all op…☆210Oct 23, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆605Mar 19, 2022Updated 4 years ago
- Persistence by writing/reading shellcode from Event Log☆379May 27, 2022Updated 3 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,502Dec 21, 2023Updated 2 years ago
- Microsoft Office Word Rce 复现(CVE-2022-30190)☆60May 31, 2022Updated 3 years ago
- Windows rootkit for Intel x64 with 25+ features, demonstrating rootkit techniques compatible with all Windows 10 and Windows 11 versions.☆2,287Feb 15, 2026Updated last month
- Simple reverse shell to avoid Win 11 defender detection☆122Dec 21, 2021Updated 4 years ago