79 Forks
313 Stars
313 Watchers

JPGtoMalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

How to download and setup JPGtoMalware

Open terminal and run command
git clone https://github.com/abdulkadir-gungor/JPGtoMalware.git
git clone is used to create a copy or clone of JPGtoMalware repositories. You pass git clone a repository URL.
it supports a few different network protocols and corresponding URL formats.

Also you may download zip file with JPGtoMalware https://github.com/abdulkadir-gungor/JPGtoMalware/archive/master.zip

Or simply clone JPGtoMalware with SSH
[email protected]:abdulkadir-gungor/JPGtoMalware.git

If you have some problems with JPGtoMalware

You may open issue on JPGtoMalware support forum (system) here: https://github.com/abdulkadir-gungor/JPGtoMalware/issues

Similar to JPGtoMalware repositories

Here you may see JPGtoMalware alternatives and analogs

 hhvm    xhp-lib    vanilla-framework    proxychains-ng    Swift-Keylogger    cameradar    Hack    esp8266_deauther    arachni    Windows-Hacks    pwndbg    xssor2    goprowifihack    BetterDiscordApp    awesome-iot-hacks    ChameleonMini    memorpy    wifi_ducky    scanmem    AimTux    Wi-PWN    goHackTools    Charlatano    onenote    Hacking    boxx    IPBan    pygit    fbshipit    future-fstrings