Submit your favorite resources for free.

Submit
HackDB logoHackDB
icon of Malicious PixelCode

Malicious PixelCode

A covert technique encoding executables into pixel data within images/videos, executed in memory, highlighting unconventional data delivery.

Introduction

Malicious PixelCode is a security research project demonstrating a technique for encoding executable files into pixel data, stored within images or videos. A lightweight loader retrieves the media, reconstructs the binary, and executes it in memory.

Key Features:

  • Executable Encoding: Converts executable files into pixel data.
  • Covert Storage: Stores encoded data inside images or videos.
  • Lightweight Loader: Retrieves and reconstructs the original binary.
  • In-Memory Execution: Executes the binary directly in memory.
  • Unconventional Delivery: Highlights alternative data delivery methods.

Use Cases:

  • Security Research: Analyzing data obfuscation and covert storage techniques.
  • Educational Purposes: Understanding unconventional encoding channels.
  • Defensive Security: Exploring security implications of transporting encoded data.

Information

  • Publisher
  • Websitegithub.com
  • Created date11/23/2025
  • Published date11/24/2025

Tags

215+ Subscribers
Newsletter

Join 215+ Professionals

Receive our monthly newsletter featuring the latest additions to the directory.

No spam. Unsubscribe anytime.