Skip to content

Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.Silent JPG Exploit There are multiple Exploit JPG in Silent JPG Exploit…

License

Notifications You must be signed in to change notification settings

xcx-0/Exploit-jpg

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Locations

Locations

Locations

Warning!

**I am not the creator of these codes, they are extracted from dark web forums

Featrues

  • Unlimited Build Files

  • Unlimited Spread Files

  • Small File size

  • Compatible with RATs, Keyloggers, Botnets, or any other exe

  • Best Results on AV 0/35

  • Easy to use Exploit Builder

                             

📌 Our team specializes in the following programming languages:...

About

Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.Silent JPG Exploit There are multiple Exploit JPG in Silent JPG Exploit…

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 96.1%
  • Python 3.9%