abdulkadir-gungor / JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆393Updated 2 years ago
Alternatives and similar repositories for JPGtoMalware:
Users that are interested in JPGtoMalware are comparing it to the libraries listed below
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆464Updated 4 months ago
- AV evading OSX Backdoor and Crypter Framework☆284Updated last year
- Arbitrium is a cross-platform, fully undetectable remote access trojan, to control Android, Windows and Linux and doesn't require any fir…☆355Updated 4 years ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆347Updated last year
- Python AV Evasion Tools☆508Updated 3 months ago
- Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions☆371Updated last year
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆252Updated 4 years ago
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆475Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆158Updated last year
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆283Updated 4 years ago
- Hide your payload into .jpg file☆391Updated 3 years ago
- ☆121Updated last year
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- Modular penetration testing platform that enables you to write, test, and execute exploit code.☆304Updated 4 months ago
- Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscat…☆181Updated last week
- Automated exploit scanner for cameras on the internet☆190Updated last year
- zerosum0x0's Koadic☆290Updated 3 years ago
- Command & Control-Framework created for collaboration in python3☆318Updated last year
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆804Updated 9 months ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆791Updated last year
- Remote persistent 🔑Logger for Windows and Linux☆298Updated 2 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- New Redline Leak☆128Updated 4 years ago
- Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK☆289Updated 11 months ago
- CVE-2023-38831 winrar exploit generator☆788Updated last year
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.☆51Updated 4 years ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆423Updated 9 months ago
- Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.☆351Updated 10 months ago
- "Socialx" is a Social Engineering And Remote Access Trojan Tool. You can generate fud backdoor and you can embed any file you want inside…☆318Updated 3 years ago