Skip to content

A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from the image stored in a binary's resources section (.rsrc)

License

Notifications You must be signed in to change notification settings

WafflesExploits/hide-payload-in-images

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

38 Commits
 
 
 
 
 
 

Repository files navigation

Hiding Shellcode in Image Files with Python and C/C++

-> A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from the image stored in a binary's resources section (.rsrc)

Note: This repository just hit 142 stars ⭐! Thank you guys so much for your support!

🔍 Learn more about this in my blog post:

Code of this Project

❗ Updates ❗

  1. Stealthier Payload Extraction: Implemented manual PE header parsing to retrieve resources without WinAPI calls, avoiding detection vectors.
  2. PEB Reliability Fix: Replaced function hGetCurrentModuleHandle's unsafe backward header parsing with direct PEB access via __readgsqword/__readfsdword, resolving compiler-optimization crashes and supporting x86/x64. This new function has two alternatives, based on whether the project is a DLL or a EXE.
  3. PEB Structure Support: Added PEB_Structs.h for portable PEB/PE definitions, eliminating dependencies on Windows headers.

🎥 Video Demo

👉 Watch the full video demo here:

  • Updated to include payload-extractor-from-resource-via-peb.cpp demo.

Support & Contributions

Enjoying my content? Show your support by sharing or starring the repo!

You can also support me on buy me a ko-fi to fuel more awesome content:

Buy me a KO-FI

💬 Have feedback or ideas? I’d love to hear your thoughts or suggestions!

Looking for a Pentester? I’m open for contracts and full-time opportunities – feel free to DM me!

Credits

Made with 💙 by @WafflesExploits

About

A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from the image stored in a binary's resources section (.rsrc)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published