Skip to content

CVenom is An Ultra Easy-To-Use Cross-Platform Malware Development Kit For Advanced Malware Development

License

Notifications You must be signed in to change notification settings

electromoe/CVenom

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVenom (Core is Under Development)

Where The Simplicity Become Dangerous ...
         A True Cross-Platform Malware Development Kit

C/C++ Are Absolutely The Best Languages To Develop Malwares, Advanced, And Undetectable, Scary Hardware And L2 I/O Access, As You Know, C/C++ Codes, API Calls, Library Calls, System Calls Differ Between Linux And Windows, So, That's Why We Created CVenom

Before Everything

We've All Heard About, Or Even Used Software Development Kits, Like JDK (Java Development Kit), QT (Desktop Apps Development Kit), [...], But, Have You Ever Heard About A Malware Development Kit?! Firstly You Should Understand That You Can't Code a Malware Using Python, Java, Golang, C#, [...], There Is a Huge Amount Of Python Modules Used in Hacking, Like The Keylogger Module, Scapy, [...], But Unfortunately, All Of Those Modules Will Not Help in malware Development, Even if you compiled the python code (Including Java, C#, Go...)

When I Said Malware, I Didn't Meant A Simple Reverse Shell That You Can Code it with 3 Lines of Python Code, I Meant Malware With Hardware Access, Low-Level Kernel-Level And Hardware-Level Input/Output Control And Manipulation API, Evading in The Dark Corner Of the Operating System, Working Far Away From User-Level API, High-Speed Data Processing Encryption And Decryption, Intelligent Execution-Flow Redirection (Supports Redirecting Execution Into the Stack), Custom Evasion Functionality, Hardware Bombing, Intelligent Process Injector, Customized Compilation Process And A Lot More[...], All Of Those Stuffs, Can Be Used Under The OOP Concept, As Follow


#include <CVenom.h>
         
#include <RuntimeTools.h>
#include <EvasionTools.h>

int main(int argc, char** argv){


         cvinit(argc, argv);                                   // Initializing CVenom, Should Be Always Inserted in The Start of the Main Function With Argc and Argv

         RuntimeTools      Runner;
         EvasionTools      Evador;
         
         Runner.Background();                                  // Used To Move Execution Into Background;
         Evador.HandleAllSignals( Evador.ChangePID );          // Used To Change Current Procces PID If Any Signal Was Invoked By The User Or The Kernel
         Evador.MoveIntoMemory();                              // Used To Move The Malware From The Hard Disk To The RAM (Used To Create Fileless Malwares).
         Runner.Sleep(5);                                      // Pause The Malware For 5 Seconds
         Evador.MoveBackToDisk();                              // Move The Malware From Memory Back To Disk (Not Required Because The cvexit() Function is going to Check if the malware is On the disk Or Not, Then Move It Back From Memory Into Disk.
         
         cvexit(0);                                            // Freeing CVenom's Memory, Should Be Always Inserted in the end of the main function with the exit code.


}



C/C++ Are Absolutely The Best Languages To Develop Malwares, Advanced, And Undetectable, Scary Hardware And L2 I/O Access, As You Know, C/C++ Codes, API Calls, Library Calls, System Calls Differ Between Linux And Windows, So, Welcome To CVenom.

Introducing, CVenom

Cross-Platform OOP Based Malware Development

System Resources, Hardware Devices, Files, Processes,... Are All Controlled And Manipulated By Objects. EX: The Header KeyboardTools.h Contain The KeyboardTools Object, Used To Control The Keyboard Device, Sniff Bytes From The Keyboard, Decode Bytes To Keystrokes, Analyze It Or Save It...

About

CVenom is An Ultra Easy-To-Use Cross-Platform Malware Development Kit For Advanced Malware Development

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 75.7%
  • C 12.4%
  • Shell 11.9%