It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web app…
☆21May 23, 2022Updated 3 years ago
Alternatives and similar repositories for JPGtoMalware
Users that are interested in JPGtoMalware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Feb 16, 2024Updated 2 years ago
- WhatsApp Bot with rich features☆13Aug 6, 2022Updated 3 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆35Apr 30, 2025Updated 11 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Red Teaming Tactics and Techniques☆11Sep 11, 2020Updated 5 years ago
- Blackvenom is a python based Script. Blckvenom is an automated tool that can generate payload using metasploit. You can generate payload …☆33Sep 7, 2022Updated 3 years ago
- package scrcpy with flatpak☆12Mar 19, 2023Updated 3 years ago
- A simple phishing maker that converts the website source code into a phishing website☆13Aug 25, 2022Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆150Jun 20, 2022Updated 3 years ago
- A repository full of malware samples.☆13Nov 29, 2020Updated 5 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Jan 10, 2021Updated 5 years ago
- Bash script that, given a youtube video id, prints the url of each format for download.☆11Mar 23, 2014Updated 12 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Jan 19, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- activity-based modelling pipeline (for transport demand models)☆18Sep 23, 2025Updated 7 months ago
- ☆14Mar 28, 2024Updated 2 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 2 months ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆28Nov 21, 2022Updated 3 years ago
- Transform your batch (bat) script into one binary.exe☆52Feb 11, 2024Updated 2 years ago
- Motorola script to flash firmware to smartphones☆10May 22, 2020Updated 5 years ago
- # Installation: * Windows: * Download Python 3.8 from [here](https://www.python.org/downloads/release/python-38) * Launch installer,…☆10Feb 2, 2024Updated 2 years ago
- Literally does the opposite of Ciphey. Encrypts text.☆11Feb 25, 2021Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- pArAnoIA - Tiny "Secure" Browser☆13Nov 2, 2024Updated last year
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Personal Systemd Service files☆12Nov 4, 2024Updated last year
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 5 years ago
- A Simple Python Extractor, Decompiler, Deobfuscator, and Disassembler that helps you Reverse Engineer Python-Based Malware, Viruses, Rans…☆61Jun 4, 2022Updated 3 years ago
- An Internet solution for AnLinux projects (Released)☆14May 3, 2022Updated 3 years ago
- Docker SSH Tunnel☆12Mar 17, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ChatGPT/Gemini AI for WhatsApp using Google's Gemini API/OAI API and whatsapp-web.js, written in JS using Node.js☆17Dec 31, 2024Updated last year
- Boot from USB stick with multiple ISO files of: Ubuntu + Windows XP/7/10 + WindowsPE (windows live)☆10Jan 20, 2021Updated 5 years ago
- Graphical Environment for Alpine linux in termux☆16Feb 23, 2021Updated 5 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- fetchJS is a lightweight JavaScript library designed to streamline the process of making HTTP requests in client-side applications. With …☆11Jun 19, 2024Updated last year