abdulkadir-gungor / JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆371Updated 2 years ago
Related projects: ⓘ
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆401Updated 6 months ago
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆328Updated 3 years ago
- AV evading OSX Backdoor and Crypter Framework☆272Updated 6 months ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆142Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆215Updated 3 years ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆327Updated 7 months ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆328Updated 9 months ago
- Command & Control-Framework created for collaboration in python3☆302Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆294Updated last year
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆397Updated 2 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆506Updated 7 months ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆449Updated last year
- Python AV Evasion Tools☆489Updated 2 years ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆166Updated last year
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆280Updated 3 years ago
- ☆112Updated 6 months ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆719Updated 9 months ago
- zerosum0x0's Koadic☆257Updated 2 years ago
- Hide your payload into .jpg file☆384Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆11Updated 9 months ago
- For educational purposes only, samples of 400+ classic/modern trojan builders including screenshots.☆486Updated this week
- New Redline Leak☆122Updated 3 years ago
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆277Updated last month
- Remcos Professional Cracked By Alcatraz3222-Remote Administration Trojan-RAT☆91Updated 2 months ago
- mip22 is a advanced phishing tool☆597Updated last month
- Create a fully undetectable backdoor with simple steps.☆72Updated 2 years ago
- ☆434Updated this week
- EvilSelenium is a tool that weaponizes Selenium to attack Chromium based browsers.☆585Updated 2 years ago
- Remote Access Trojan collection.(260+ RAT-Builders!)☆187Updated 2 years ago
- Automated exploit scanner for cameras on the internet☆166Updated 6 months ago