Where The Simplicity Become Dangerous ... A True Cross-Platform Malware Development Kit
C/C++ Are Absolutely The Best Languages To Develop Malwares, Advanced, And Undetectable, Scary Hardware And L2 I/O Access, As You Know, C/C++ Codes, API Calls, Library Calls, System Calls Differ Between Linux And Windows, So, That's Why We Created CVenom
We've All Heard About, Or Even Used Software Development Kits, Like JDK (Java Development Kit), QT (Desktop Apps Development Kit), [...], But, Have You Ever Heard About A Malware Development Kit?! Firstly You Should Understand That You Can't Code a Malware Using Python, Java, Golang, C#, [...], There Is a Huge Amount Of Python Modules Used in Hacking, Like The Keylogger Module, Scapy, [...], But Unfortunately, All Of Those Modules Will Not Help in malware Development, Even if you compiled the python code (Including Java, C#, Go...)When I Said Malware, I Didn't Meant A Simple Reverse Shell That You Can Code it with 3 Lines of Python Code, I Meant Malware With Hardware Access, Low-Level Kernel-Level And Hardware-Level Input/Output Control And Manipulation API, Evading in The Dark Corner Of the Operating System, Working Far Away From User-Level API, High-Speed Data Processing Encryption And Decryption, Intelligent Execution-Flow Redirection (Supports Redirecting Execution Into the Stack), Custom Evasion Functionality, Hardware Bombing, Intelligent Process Injector, Customized Compilation Process And A Lot More[...], All Of Those Stuffs, Can Be Used Under The OOP Concept, As Follow
#include <CVenom.h>
#include <RuntimeTools.h>
#include <EvasionTools.h>
int main(int argc, char** argv){
cvinit(argc, argv); // Initializing CVenom, Should Be Always Inserted in The Start of the Main Function With Argc and Argv
RuntimeTools Runner;
EvasionTools Evador;
Runner.Background(); // Used To Move Execution Into Background;
Evador.HandleAllSignals( Evador.ChangePID ); // Used To Change Current Procces PID If Any Signal Was Invoked By The User Or The Kernel
Evador.MoveIntoMemory(); // Used To Move The Malware From The Hard Disk To The RAM (Used To Create Fileless Malwares).
Runner.Sleep(5); // Pause The Malware For 5 Seconds
Evador.MoveBackToDisk(); // Move The Malware From Memory Back To Disk (Not Required Because The cvexit() Function is going to Check if the malware is On the disk Or Not, Then Move It Back From Memory Into Disk.
cvexit(0); // Freeing CVenom's Memory, Should Be Always Inserted in the end of the main function with the exit code.
}
C/C++ Are Absolutely The Best Languages To Develop Malwares, Advanced, And Undetectable, Scary Hardware And L2 I/O Access, As You Know, C/C++ Codes, API Calls, Library Calls, System Calls Differ Between Linux And Windows, So, Welcome To CVenom.
System Resources, Hardware Devices, Files, Processes,... Are All Controlled And Manipulated By Objects. EX: The Header KeyboardTools.h Contain The KeyboardTools Object, Used To Control The Keyboard Device, Sniff Bytes From The Keyboard, Decode Bytes To Keystrokes, Analyze It Or Save It...