Tools Hacking
81

JPGtoMalware It embeds the executable file






  28-May-2022 23:28:16



JPGtoMalware It embeds the executable file or payload inside the jpg file.


The method the program uses isn't exactly called one of the steganography methods [secure cover selection, least significant bit, palette-based technique, etc ]. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods.However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.


This project was created for educational purposes and should not be used in environments without legal authorization

https://github.com/abdulkadir-gungor/JPGtoMalware 


DISCUSSION
Nothing comment here :(
Login for comment and discussion.
Login Here
Sponsored

Oppss... No sponsors yet

Popular Posts
Complete Basic Course in Kali...
Djie sam soe Djie sam soe
Linux
10267
2
Top

Gps Tracker Seccodeid Free Too...
Djie sam soe Djie sam soe
General
7249
167
Top

Free Proxy List
Sandidi Sandidi
Networking
3067
3
Top

Mass Reverse IP Unlimited
ImamWawe ImamWawe
Tools Hacking
2369
12
Top

Report McAfee Antivirus Hurrri...
Indrasp Indrasp
Windows
1703
93
Top

Related Post

Youtube Video

Subscribe