It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆21May 23, 2022Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Feb 16, 2024Updated 2 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆34Apr 30, 2025Updated 11 months ago
- Red Teaming Tactics and Techniques☆11Sep 11, 2020Updated 5 years ago
- Remote Access Tool written in VBNET☆17Sep 8, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Eclectic ICS (Industrial Control Systems) Resources & References☆16May 7, 2021Updated 4 years ago
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Sep 7, 2022Updated 3 years ago
- A simple phishing maker that converts the website source code into a phishing website☆13Aug 25, 2022Updated 3 years ago
- This is a Rubber Ducky script that downloads an executable file externally while bypassing Windows antivirus and added to the exclusions …☆15Jul 29, 2021Updated 4 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 2 months ago
- ☆14Mar 28, 2024Updated 2 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated last month
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Transform your batch (bat) script into one binary.exe☆53Feb 11, 2024Updated 2 years ago
- ☆11Nov 22, 2022Updated 3 years ago
- # Installation: * Windows: * Download Python 3.8 from [here](https://www.python.org/downloads/release/python-38) * Launch installer,…☆10Feb 2, 2024Updated 2 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated 2 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Car Hacking Toolkit☆13Oct 15, 2021Updated 4 years ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 5 years ago
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆20Dec 18, 2025Updated 3 months ago
- A Simple Python Extractor, Decompiler, Deobfuscator, and Disassembler that helps you Reverse Engineer Python-Based Malware, Viruses, Rans…☆59Jun 4, 2022Updated 3 years ago
- An Internet solution for AnLinux projects (Released)☆14May 3, 2022Updated 3 years ago
- Docker SSH Tunnel☆12Mar 17, 2026Updated 3 weeks ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- ☆14Dec 3, 2020Updated 5 years ago
- Boot from USB stick with multiple ISO files of: Ubuntu + Windows XP/7/10 + WindowsPE (windows live)☆10Jan 20, 2021Updated 5 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago