Tools Hacking
217

JPGtoMalware It embeds the executable file






  28-May-2022 23:28:16



JPGtoMalware It embeds the executable file or payload inside the jpg file.


The method the program uses isn't exactly called one of the steganography methods [secure cover selection, least significant bit, palette-based technique, etc ]. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods.However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.


This project was created for educational purposes and should not be used in environments without legal authorization

https://github.com/abdulkadir-gungor/JPGtoMalware 

*Beware click the link!


DISCUSSION
Nothing comment here :(
Login for report, comment and join discussion
Login Here
Sponsored

Popular Posts
Gps Tracker Seccodeid Free Too...
General
21165
202
Top


Djie sam soe Djie sam soe
Complete Basic Course in Kali...
Linux
14157
4
Top


Djie sam soe Djie sam soe
Komintod (Ministry of Communic...
Data Leak
6396
70
Top


Murtad methamphetamine Murtad methamphetamine
Free Proxy List
Networking
3596
3
Top


Sandidi Sandidi
Mass Reverse IP Unlimited
Tools Hacking
3314
13
Top


ImamWawe ImamWawe

Related Post

Youtube Video

Subscribe