/hide-payload-in-images

A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from the image stored in a binary's resources section (.rsrc)

Primary LanguageC++Apache License 2.0Apache-2.0

Hiding Shellcode in Image Files with Python and C/C++

-> A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from the image stored in a binary's resources section (.rsrc)

Note: This repository just hit 101 stars ⭐! Thank you guys so much for your support!

🔍 Learn more about this in my blog post:

Code of this Project

❗ Updates ❗

  1. Stealthier Payload Extraction: Implemented manual PE header parsing to retrieve resources without WinAPI calls, avoiding detection vectors.
  2. PEB Reliability Fix: Replaced function hGetCurrentModuleHandle's unsafe backward header parsing with direct PEB access via __readgsqword/__readfsdword, resolving compiler-optimization crashes and supporting x86/x64.
  3. PEB Structure Support: Added PEB_Structs.h for portable PEB/PE definitions, eliminating dependencies on Windows headers.

🎥 Video Demo

👉 Watch the full video demo here:

  • Updated to include payload-extractor-from-resource-via-peb.cpp demo.

Support & Contributions

Enjoying my content? Show your support by sharing or starring the repo!

You can also support me on buy me a ko-fi to fuel more awesome content:

Buy me a KO-FI

💬 Have feedback or ideas? I’d love to hear your thoughts or suggestions!

Looking for a Pentester? I’m open for contracts and full-time opportunities – feel free to DM me!

Credits

Made with 💙 by @WafflesExploits