HarsTown / Alien-Crypter-Crack-Source-Code-Net-Native

Framework Payload - Payload Generator | Crypter FUD AntiVirus Evasion

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Alien Crypter

image

A crypter constitutes a variant of software adept at encrypting, obscuring, and manipulating malicious software, thus heightening its resistance against identification by security applications. Cyber malefactors employ this tool to fabricate malware capable of eluding security applications by assuming the guise of an innocuous program until its installation is accomplished. Diverse categories of crypters find existence.

Legal Notice

Crypter is designed exclusively for educational and investigative intentions. Its utility should be confined to systems or networks where you possess legitimate authorization. It must unequivocally not be employed for any unlawful or illicit endeavors. The author relinquishes any accountability for potential harm that might ensue from the utilization of the software found within this repository.

Upon compilation, Crypter SHALL employ encryption on the files residing within the computer on which its execution occurs. While Crypter furnishes the decryption key, granting access to decrypt encrypted files, it's plausible that glitches and other complications might potentially disrupt or thwart seamless decryption. As a result, an unrecoverable data loss is plausible. To preempt any plausible harm, it is imperative to confine the use of Crypter to a dedicated test apparatus established for this explicit intent.

Once more, the author disclaims any accountability for prospective damages, and by obtaining this software, you validate and assent to this legal disclaimer.

Operational Mechanism

Constructor

The constructor serves as the tool that empowers you to personalize and forge the Crypter Ransomware. Several of the configurations you can define incorporate:

  • Icon for the Executable Binary File
  • Title/Heading for the Graphical User Interface (GUI)
  • Font and Background Color for the GUI
  • Bitcoin Wallet Address
  • Ransom Fee
  • Ransom Message
  • Stipulated Time for Payment
  • Eradication of File Shadow Copies
  • File Types to Undergo Encryption

and an array of additional facets. Once these parameters are established, a mere press of the BUILD button suffices to engender the executable.

Ransom Operation

Upon activation, Crypter shall undergo the ensuing sequence:

  • Production of an AES-256 bit encryption/decryption key and its inscription into key.txt within the prevailing directory
  • Quest for pertinent destinations (comprising network drives, user repositories, etc.) in pursuit of files that align
  • Encryption of all located congruent files
  • Presentation of the Crypter Graphical User Interface (GUI) to the afflicted party

About

Framework Payload - Payload Generator | Crypter FUD AntiVirus Evasion

License:MIT License


Languages

Language:C 59.8%Language:C++ 40.2%