abdulkadir-gungor / JPGtoMalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

Date Created 2022-05-22 (2 years ago)
Commits 19 (last one 2 years ago)
Stargazers 376 (1 this week)
Watchers 9 (0 this week)
Forks 80
License other
Ranking

RepositoryStats indexes 585,332 repositories, of these abdulkadir-gungor/JPGtoMalware is ranked #112,042 (81st percentile) for total stargazers, and #224,134 for total watchers. Github reports the primary language for this repository as Python, for repositories using this language it is ranked #18,855/116,570.

abdulkadir-gungor/JPGtoMalware is also tagged with popular topics, for these it's ranked: cybersecurity (#252/944),  malware (#156/569),  hack (#114/403),  ethical-hacking (#26/140)

Star History

Github stargazers over time

Watcher History

Github watchers over time, collection started in '23

Recent Commit History

19 commits on the default branch (main) since jan '22

Yearly Commits

Commits to the default branch (main) per year

Issue History

Languages

The only known language in this repository is Python

updated: 2024-11-21 @ 09:13pm, id: 495103097 / R_kgDOHYKseQ