r00t-3xp10it / JPGtoMalwareView external linksLinks
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆20May 23, 2022Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below
Sorting:
- ☆11Feb 16, 2024Updated 2 years ago
- WhatsApp Bot with rich features☆13Aug 6, 2022Updated 3 years ago
- A simple phishing maker that converts the website source code into a phishing website☆13Aug 25, 2022Updated 3 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Mar 13, 2022Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- A Programmer☆13Dec 20, 2025Updated last month
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Sep 7, 2022Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆27Nov 21, 2022Updated 3 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- # Installation: * Windows: * Download Python 3.8 from [here](https://www.python.org/downloads/release/python-38) * Launch installer,…☆10Feb 2, 2024Updated 2 years ago
- This is Advance Phishing Tool ! OTP PHISHING☆35Jun 27, 2022Updated 3 years ago
- xSMTP 🦟 Lightning fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.☆80Jun 3, 2023Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Jun 20, 2022Updated 3 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- Auxile Framework☆28Oct 1, 2020Updated 5 years ago
- package scrcpy with flatpak☆12Mar 19, 2023Updated 2 years ago
- A powerful reverse shell generator☆46Apr 15, 2022Updated 3 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆43Nov 24, 2024Updated last year
- ☆11Nov 22, 2022Updated 3 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- ☆13Mar 28, 2024Updated last year
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- This is for kex repair and solve VNC server error in kali linux android in Termux .☆17Sep 25, 2023Updated 2 years ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 4 years ago
- My Nmap without root privileges! For hackers.☆43Jul 30, 2023Updated 2 years ago
- Drishti is an information collection tool (OSINT) which aims to carry out Basic Information.☆49Feb 3, 2022Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Scraping and automation projects☆10Nov 11, 2020Updated 5 years ago
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆10Nov 6, 2022Updated 3 years ago
- Utilize IBM Cloud Functions with OAuth 2.0 to enable authentication and authorization☆11Feb 14, 2022Updated 4 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆12Mar 20, 2024Updated last year
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- 本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local tunnel, data compression, encryption, and pu…☆15Feb 2, 2026Updated 2 weeks ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago