pixload-bmp - hide payload/malicious code in BMP images
pixload-bmp [OPTION]... FILE
pixload-bmp creates a BMP Image with payload, or injects payload into existing image.
Mandatory arguments to long options are mandatory for short options too.
- -P, --payload STRING
-
Set payload for injection. Default is
<script src=//example.com></script>
. - -v, --version
-
Print version and exit.
- -h, --help
-
Print help and exit.
If the output FILE already exists, then payload will be injected into this existing file. Otherwise, the new one will be created.
$ pixload-bmp payload.bmp
...... BMP Payload Creator/Injector ......
..........................................
... https://github.com/sighook/pixload ...
..........................................
[>] Generating output file
[✔] File saved to: payload.bmp
[>] Injecting payload into payload.bmp
[✔] Payload was injected successfully
payload.bmp: PC bitmap, OS/2 1.x format, 1 x 1 x 24, cbSize 10799, bits offset 26
00000000 42 4d 2f 2a 00 00 00 00 00 00 1a 00 00 00 0c 00 |BM/*............|
00000010 00 00 01 00 01 00 01 00 18 00 00 00 ff 00 2a 2f |..............*/|
00000020 3d 31 3b 3c 73 63 72 69 70 74 20 73 72 63 3d 2f |=1;<script src=/|
00000030 2f 65 78 61 6d 70 6c 65 2e 63 6f 6d 3e 3c 2f 73 |/example.com></s|
00000040 63 72 69 70 74 3e 3b |cript>;|
00000047
pixload-gif(1), pixload-jpg(1), pixload-png(1), pixload-webp(1)