Jump to content

Recommended Posts


Neste vídeo ensinei como camuflar um arquivo, E deixá-lo pra abrir toda vez que o windows inicia, Com este método você consegue deixar seu trojan escondido no computador enquanto quem inicia com o windows na verdade é um atalho escondido que faz todo dia executar o server camuflado.

Share this post

Link to post
Share on other sites

Tem como juntar com um arquivo do excel pra executar junto sim,  Só que fazer o arquivo ter a extensão não, Só que dá pra deixar bem parecido com um rar de primeira e um icone tudo bem camuflado


Share this post

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

  • Similar Content

    • Guest
      By Guest
      > ccrypt.exe ..\..\..\..\Desktop\toCrypt.txt -e -S .txt
      Enter encryption key:
      Enter encryption key: (repeat)

      > ccrypt.exe ..\..\..\..\Desktop\toCrypt.txt.txt -d -S .txt
      Enter decryption key:

      ccrypt.exe --help
      Usage: ccrypt [mode] [options] [file...]
             ccencrypt [options] [file...]
             ccdecrypt [options] [file...]
             ccat [options] file...
          -e, --encrypt         encrypt
          -d, --decrypt         decrypt
          -c, --cat             cat; decrypt files to stdout
          -x, --keychange       change key
          -u, --unixcrypt       decrypt old unix crypt files
          -h, --help            print this help message and exit
          -V, --version         print version info and exit
          -L, --license         print license info and exit
          -v, --verbose         print progress information to stderr
          -q, --quiet           run quietly; suppress warnings
          -f, --force           overwrite existing files without asking
          -m, --mismatch        allow decryption with non-matching key
          -E, --envvar var      read keyword from environment variable (unsafe)
          -K, --key key         give keyword on command line (unsafe)
          -k, --keyfile file    read keyword(s) as first line(s) from file
          -P, --prompt prompt   use this prompt instead of default
          -S, --suffix .suf     use suffix .suf instead of default .cpt
          -s, --strictsuffix    refuse to encrypt files which already have suffix
          -F, --envvar2 var     as -E for second keyword (for keychange mode)
          -H, --key2 key        as -K for second keyword (for keychange mode)
          -Q, --prompt2 prompt  as -P for second keyword (for keychange mode)
          -t, --timid           prompt twice for encryption keys (default)
          -b, --brave           prompt only once for encryption keys
          -y, --keyref file     encryption key must match this encrypted file
          -r, --recursive       recurse through directories
          -R, --rec-symlinks    follow symbolic links as subdirectories
          -l, --symlinks        dereference symbolic links
          -T, --tmpfiles        use temporary files instead of overwriting (unsafe)
          --                    end of options, filenames follow
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.