ccva is software that came to my mind watching mr robot series. It allows you to hide more files into another one (.mp3 , .jpg, .pdf, .exe tested) with the possibility of crypt it using the AES256 method
☆20Oct 19, 2019Updated 6 years ago
Alternatives and similar repositories for ccva
Users that are interested in ccva are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆148Jun 20, 2022Updated 3 years ago
- Simple Cryptor on C ++ without using .NET and other nonsense.☆12Sep 4, 2025Updated 7 months ago
- powershell免杀混淆器,简单有效。A simple and effective powershell obfuscaiton tool bypass Anti-Virus☆19Dec 2, 2022Updated 3 years ago
- An exploit that allows you to bind an exe to a pdf for the 2010 adobe reader.☆14Nov 26, 2019Updated 6 years ago
- ☆15Nov 11, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Expired FUD .exe crypter☆12Aug 21, 2016Updated 9 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- Python Key logger that runs in the background and captures key strokes, then emails them to any specified gmail address after a set inter…☆16Aug 10, 2020Updated 5 years ago
- Osint Mass Mail Attack tool.☆31Jul 22, 2020Updated 5 years ago
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using A…☆28Sep 4, 2025Updated 7 months ago
- ☆94Nov 1, 2018Updated 7 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit☆41Nov 2, 2023Updated 2 years ago
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆19Jun 26, 2020Updated 5 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- ☆20Aug 12, 2014Updated 11 years ago
- Fyyx Wallet Finder is a Python app that searches for cryptocurrency wallets with balances in BTC and ETH. It logs results/errors and save…☆12Jun 11, 2024Updated last year
- Contact Telegram : https://t.me/hakanonymos☆57May 17, 2024Updated last year
- PowerShell-powered Chrome password extractor for Windows 10☆27May 29, 2022Updated 3 years ago
- N-Name, lightweight dotNet DLL Obfuscator☆20Jun 4, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cronos Crypter is an simple example of crypter created for educational purposes.☆104Sep 19, 2024Updated last year
- ChatGPT Jailbreak promts☆16Mar 22, 2023Updated 3 years ago
- Easiest way to reset your debian based linux back to stock on the terminal☆12Jan 7, 2019Updated 7 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Hollow Process / Dynamic Forking / RunPE injection technique implemented in Python☆54Jun 18, 2021Updated 4 years ago
- Compare PDF documents using PDF Miner and print out the differences as HTML documents☆17Apr 12, 2020Updated 5 years ago
- Simple extension spoofer that will change your dangerous file (not only) into something like "Presentation-for_schoolexe.pptx", "exeexeex…☆17Jan 23, 2022Updated 4 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 13 years ago
- A collection of hardware Trojans (HTs) automatically generated by Large Language Models (GPT-4, Gemini-1.5-pro, and LLaMA3) targeting SRA…☆11Oct 8, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Pyxuss Crypto Wallet Finder v1 🚀 | Owner: Pyxuss 🇳🇵 | Purpose: Find lost ETH/BTC wallets using seed phrases or addresses 🔑. Features:…☆20Jan 11, 2025Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- ADVANCE MAIL BOMBING WITH SPOOFING☆16Feb 1, 2022Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- This is an advanced keylogger which sends keylog reports every 30 minutes to the specified email on the config file.☆21Aug 19, 2021Updated 4 years ago
- Network Security Config patcher for Android applications (APKs)☆13Sep 4, 2021Updated 4 years ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Jan 28, 2024Updated 2 years ago