r00t-3xp10it / JPGtoMalwareLinks
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆19Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below
Sorting:
- The purpose of this tool is to automate the payload Creation Process. U can Create Payloads For All Types of OS in Seconds.☆54Updated last year
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆37Updated 9 months ago
- Simple python script that attacks phishing sites database with fake random generated usernames and passwords to flood their databases wit…☆10Updated 4 years ago
- Dogma V1.5.3☆31Updated 5 years ago
- ⛤Keylogger Generator for Windows written in Python⛤☆55Updated 2 years ago
- Ro3b - Advance Banking HTTP Botnet☆52Updated 2 years ago
- A very user friendly and advanced phishing toolkit made for hackers☆35Updated 3 years ago
- HTML WannaCry Ransomware v2.0 - websites defacement injection page☆30Updated 3 years ago
- WH-ApkCrypter-V2 100% bypass 2020☆43Updated last year
- Deface HTML Page Generator☆106Updated 3 months ago
- Websites Vulnerability Scanner☆73Updated 3 months ago
- Meterpreter payload for all platforms☆72Updated 3 years ago
- Generate Professional Phishing Emails Fast And Easy☆25Updated 4 years ago
- The Advanced Automated Pen testing And Forensics Tool NoJle built using python it's for lazy hackers to automate most used Linux commands…☆44Updated 3 years ago
- Worm/Trojan/Ransomware/apt/Rootkit/Virus Database☆98Updated 11 months ago
- this is a email bomber unlike other email bombers u don't need your gmail email id to use this☆18Updated 3 years ago
- python script that hide phishing url like a pro "masking url technique"☆42Updated 4 years ago
- Distributed Denial of Service - Website Stress☆40Updated 10 months ago
- Advance Phishing page which can bypass instagram 2FA☆102Updated 3 years ago
- A Scampage-Builder tool is a malicious software or program designed to create scam web pages, often used in phishing attacks.☆21Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆21Updated last year
- Designed to scan and exploit vulnerabilities within Tor hidden services. TORhunter allows most tools to work as normal while resolving .o…☆110Updated 3 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆23Updated 5 years ago
- Usage of WH-HackerExploit Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility …☆40Updated 3 years ago
- Wi-Fi Password Stealer☆60Updated 11 months ago
- Virus Repository☆47Updated 10 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- GUI based tool to track location and more info of mobile numbers☆74Updated last year
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Updated 2 years ago
- Powerful Malware for Termux ;)☆18Updated 3 years ago