khaledmezara

khaledmezara

Geek Repo

Github PK Tool:Github PK Tool

khaledmezara's starred repositories

JPGtoMalware

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.

Language:PythonLicense:NOASSERTIONStargazers:372Issues:0Issues:0

blackbird

An OSINT tool to search for accounts by username and email in social networks.

Language:PythonStargazers:2605Issues:0Issues:0

csgo_memory_hacking_examples

CsGO Memory Hacking C++ code examples. Ex: Read HP,Name,Coord,Bones,Weapons,items etc.

Language:C++License:MITStargazers:52Issues:0Issues:0

pubg_mobile_memory_hacking_examples

Pubg Mobile Emulator Gameloop Memory Hacking C++ code examples. Ex: Name, Coord, Bones, Weapons, Items, Box, Drop etc.

Language:C++Stargazers:483Issues:0Issues:0

MRK-Android

Multi-Utility dynamic library for Android

Language:C++Stargazers:19Issues:0Issues:0