Skip to content
#

gungor

Here are 6 public repositories matching this topic...

It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web appli…

  • Updated Jun 17, 2022
  • Python

HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and Ja…

  • Updated Jun 20, 2022
  • Python

It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executable or payload in the zip/rar file without any action. In this way, it can be triggered and run by documents in the compressed file or in the same folder. The second method encrypts the executable file or payloa…

  • Updated May 28, 2022
  • Python

It is a program written in Python3 in order to facilitate process analysis and to easily access Windows process tools. In this way, it facilitates malware analysis processes. In addition, processes running in the background can be detected.  After the program is started, it continues to run in the background. Afterwards, the tools can be accesse…

  • Updated Jun 3, 2022
  • Python

Improve this page

Add a description, image, and links to the gungor topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the gungor topic, visit your repo's landing page and select "manage topics."

Learn more