Kali Linux

Pycrypt : Python Based Crypter That Can Bypass Any Antivirus Products

Pycrypt is a python-based Crypter that can bypass any antivirus product. Antivirus software are protecting computers from malicious software including keyloggers, browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets, and ransomware.

Pycrypt Features

  1. FUD Ratio 0/40
  2. Bypass Any EDR Solutions
  3. Lightweight Crypter
  4. Very Small And Simple Crypter

Note:

  • Make Sure your payload file has all the libraries imported and it will be a valid payload file
  • Don’t Upload Any Payloads To VirusTotal.com Bcz This tool will not work with Time.
  • Virustotal Share Signatures With AV Companies.
  • Again Don’t be an Idiot!

How To Use?

  • Find Any Python Based Backdoor/RAT on GitHub.
  • Crypt its payload with pycrypt
  • Now Convert crypted payload to exe using pyinstaller

Download Python3

*:- For Windows: Download here.

*:- For Linux:

sudo apt-get install python3
sudo apt-get install python3-pip

Make Sure Python3 And Pip are Installed.

  • pip install termcolor
  • pip install requests

How To Run

*:- For Windows:-

Make Sure python3 and pip are installed and requirements also installed

python pycrypt.py

Then give the path of your payload file and enjoy

*:- For Linux:-

Make Sure all requirements are installed.

python3 pycrypt.py

Then enter the path of your payload file and enjoy it on the following platform.

  1. Windows
  2. Linux Based Os

How To Install

git clone https://github.com/pycrypt
cd pycrypt
python3 pycrypt.py

KleenScan Scanner Result

  1. Generated stub.py Result:-
  2. Crypter Code Result:-

Demo Video

Warning: Use this tool only for educational purposes and we will not be responsible for ur cruel act.

Balaji N

Balaji is an Editor-in-Chief & Co-Founder - Cyber Security News, GBHackers On Security & Kali Linux Tutorials.

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

12 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

12 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

12 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

12 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

12 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

15 hours ago