ccva is software that came to my mind watching mr robot series. It allows you to hide more files into another one (.mp3 , .jpg, .pdf, .exe tested) with the possibility of crypt it using the AES256 method
☆20Oct 19, 2019Updated 6 years ago
Alternatives and similar repositories for ccva
Users that are interested in ccva are comparing it to the libraries listed below
Sorting:
- Use Invoke-PSImage to deliver a payload in an Image☆53Jan 4, 2018Updated 8 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆145Jun 20, 2022Updated 3 years ago
- Simple Cryptor on C ++ without using .NET and other nonsense.☆12Sep 4, 2025Updated 6 months ago
- powershell免杀混淆器,简单有效。A simple and effective powershell obfuscaiton tool bypass Anti-Virus☆19Dec 2, 2022Updated 3 years ago
- An exploit that allows you to bind an exe to a pdf for the 2010 adobe reader.☆14Nov 26, 2019Updated 6 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- V wrapper of Edubart's minicoro - A cross-platform coroutine library☆13Nov 26, 2022Updated 3 years ago
- MuJS Binding for V/Vlang☆14Dec 23, 2022Updated 3 years ago
- Expired FUD .exe crypter☆12Aug 21, 2016Updated 9 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- A Coroutine Runtime(ish) for V☆10Sep 25, 2022Updated 3 years ago
- Python Key logger that runs in the background and captures key strokes, then emails them to any specified gmail address after a set inter…☆16Aug 10, 2020Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- Google Drive client wrapper in Python☆13Mar 31, 2025Updated 11 months ago
- Simple code to get V to run as a freestanding operating system kernel. Code snippets taken from vinix.☆11Aug 26, 2022Updated 3 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Jan 7, 2025Updated last year
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆26Sep 4, 2025Updated 6 months ago
- ☆94Nov 1, 2018Updated 7 years ago
- Fyyx Wallet Finder is a Python app that searches for cryptocurrency wallets with balances in BTC and ETH. It logs results/errors and save…☆12Jun 11, 2024Updated last year
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆19Jun 26, 2020Updated 5 years ago
- Good CLR Host with Native patchless AMSI Bypass☆23May 14, 2025Updated 10 months ago
- Vulkan game engine I'm working on☆15Jan 16, 2022Updated 4 years ago
- A driver created to bypass the anti-cheat and r/w memory through it☆15Aug 3, 2024Updated last year
- inject or convert shellcode to PE☆41Oct 14, 2019Updated 6 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- Tree-sitter parser for V☆24Jul 12, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- ☆20Aug 12, 2014Updated 11 years ago
- Contact Telegram : https://t.me/hakanonymos☆57May 17, 2024Updated last year
- Pyxuss Crypto Wallet Finder v1 🚀 | Owner: Pyxuss 🇳🇵 | Purpose: Find lost ETH/BTC wallets using seed phrases or addresses 🔑. Features:…☆18Jan 11, 2025Updated last year
- PowerShell-powered Chrome password extractor for Windows 10☆27May 29, 2022Updated 3 years ago
- N-Name, lightweight dotNet DLL Obfuscator☆20Jun 4, 2023Updated 2 years ago
- JWT implementation for nim-lang☆22May 11, 2023Updated 2 years ago
- ADVANCE MAIL BOMBING WITH SPOOFING☆15Feb 1, 2022Updated 4 years ago
- Cronos Crypter is an simple example of crypter created for educational purposes.☆104Sep 19, 2024Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Easiest way to reset your debian based linux back to stock on the terminal☆11Jan 7, 2019Updated 7 years ago