Pinned Repositories
blurhash
A very compact representation of a placeholder for an image.
chartjs-plugin-piechart-outlabels
Highly customizable Chart.js plugin that displays labels outside the pie/doughnut chart.
copilot-analysis
backup
CTF-write-up
d3-context-menu
A plugin for d3.js that allows you to easy use context-menus in your visualizations.
DNSWatch
DNSWatch
documentation
Odoo documentation sources
hakii6.github.io
JPGtoMalware
研究用 It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
Mikuroda4402's Repositories
Mikuroda4402/blurhash
A very compact representation of a placeholder for an image.
Mikuroda4402/chartjs-plugin-piechart-outlabels
Highly customizable Chart.js plugin that displays labels outside the pie/doughnut chart.
Mikuroda4402/copilot-analysis
backup
Mikuroda4402/CTF-write-up
Mikuroda4402/d3-context-menu
A plugin for d3.js that allows you to easy use context-menus in your visualizations.
Mikuroda4402/DNSWatch
DNSWatch
Mikuroda4402/documentation
Odoo documentation sources
Mikuroda4402/hakii6.github.io
Mikuroda4402/JPGtoMalware
研究用 It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
Mikuroda4402/mikuroda4402
Mikuroda4402/mikuroda4402.github.io
website
Mikuroda4402/Mousecape
Cursor Manager for OSX
Mikuroda4402/odoo13_addons
Jason
Mikuroda4402/os-queue_homework
Yuntech 107-2 os class homework
Mikuroda4402/php-jpeg-injector
Injects php payloads into jpeg images
Mikuroda4402/playground
Just play :D
Mikuroda4402/qrcodejs
Cross-browser QRCode generator for javascript
Mikuroda4402/sinopac_api
IT邦幫忙 - 第13屆鐵人賽