It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆21May 23, 2022Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below
Sorting:
- ☆11Feb 16, 2024Updated 2 years ago
- A simple phishing maker that converts the website source code into a phishing website☆13Aug 25, 2022Updated 3 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated last month
- A Programmer☆14Dec 20, 2025Updated 2 months ago
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Sep 7, 2022Updated 3 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- WSO-Webshell☆38May 2, 2021Updated 4 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- # Installation: * Windows: * Download Python 3.8 from [here](https://www.python.org/downloads/release/python-38) * Launch installer,…☆10Feb 2, 2024Updated 2 years ago
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆20Dec 18, 2025Updated 2 months ago
- This is Advance Phishing Tool ! OTP PHISHING☆35Jun 27, 2022Updated 3 years ago
- xSMTP 🦟 Lightning fast, multithreaded smtp scanner targeting open-relay and unsecured servers in multiple network ranges.☆80Jun 3, 2023Updated 2 years ago
- package scrcpy with flatpak☆12Mar 19, 2023Updated 2 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated last week
- Auxile Framework☆28Oct 1, 2020Updated 5 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- This tool will create a .exe file which will send you all the information of victim once the file executes!☆44Nov 24, 2024Updated last year
- ☆15Jul 30, 2022Updated 3 years ago
- ☆11Nov 22, 2022Updated 3 years ago
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- instagram bot reports spam☆10Oct 19, 2020Updated 5 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- This is for kex repair and solve VNC server error in kali linux android in Termux .☆17Sep 25, 2023Updated 2 years ago
- ☆13Mar 28, 2024Updated last year
- My Nmap without root privileges! For hackers.☆43Jul 30, 2023Updated 2 years ago
- Drishti is an information collection tool (OSINT) which aims to carry out Basic Information.☆49Feb 3, 2022Updated 4 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- 👷🏽 Find a your dream job in Switzerland in very little time using this awesome tool☆10Dec 22, 2024Updated last year
- A tool to BruteForce ssh. An upgraded version of Hydra. Multiple bruteforce options☆11Jul 9, 2022Updated 3 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Boot from USB stick with multiple ISO files of: Ubuntu + Windows XP/7/10 + WindowsPE (windows live)☆10Jan 20, 2021Updated 5 years ago