>> how do you guys test all of the potential PNG/JPG potential malware payloads
>What's your use-case?
lol funny story.
I downloaded all of the
github.com links ripped from the blackarch main page (~8GB worth of repositories)
ANYWAYS
I wanted to see the pictures...............start with the fun stuff first, right?
So I went: `find -type f -name '*.png' -o -name '*.jpg' -exec cp -f '{}' $SOME_DIR \;`
hehe then I was like OMG what am I doing when I saw a image name called:
Something like this:
Parser < 7.png
WHOA. my heart raced.
And I was like "I'm not ready for this."
So then I started imagining all of the stuff in those 1000+ PNG/JPG files that I want to view with ristretto image viewer.
.....and I was like: No way. No freakin' way.
I deleted all of the image files and then all of the cloned
github.com repositories.
NOT worth viewing.
I don't care if `file myfile.png` says "PNG file"
lol