Skip to content

RedTeamClub/JPGtoMalware

 
 

Repository files navigation

🖼️ JPGtoMalware - Advanced Embedding & EDR Bypass

🔬 Overview

JPGtoMalware is a sophisticated security research tool designed to demonstrate payload embedding and EDR bypass techniques using custom steganography-inspired methods. It allows security researchers to embed executables into standard .jpg files without distorting the visual integrity of the image.

🛡️ Features

  • Distortion-Free Embedding: No visual changes to the target JPG file.
  • EDR/AV Bypass: Uses encrypted payloads and "garbage code insertion" to evade static and dynamic analysis.
  • Flexible Deployment: Supports local extraction (V1), remote download/extraction (V2), and dynamic URI resolution (V3).

🚦 Quick Guide

  1. Injecting Payload: Use InjectingMalwareIntoJPG.py to embed your .exe.
  2. Extraction & Launch: Deploy malware_v1.py or the remote-extraction variants (V2/V3) to recover and execute the payload.

📜 Educational Disclaimer

This repository is for EXCLUSIVELY EDUCATIONAL and AUTHORIZED TESTING purposes. Unauthorized use against systems is illegal.


Maintained by RedTeamClub

About

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web applic

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 100.0%