Kali Linux

Pycrypt : Python Based Crypter That Can Bypass Any Antivirus Products

Pycrypt is a python-based Crypter that can bypass any antivirus product. Antivirus software are protecting computers from malicious software including keyloggers, browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets, and ransomware.

Pycrypt Features

  1. FUD Ratio 0/40
  2. Bypass Any EDR Solutions
  3. Lightweight Crypter
  4. Very Small And Simple Crypter

Note:

  • Make Sure your payload file has all the libraries imported and it will be a valid payload file
  • Don’t Upload Any Payloads To VirusTotal.com Bcz This tool will not work with Time.
  • Virustotal Share Signatures With AV Companies.
  • Again Don’t be an Idiot!

How To Use?

  • Find Any Python Based Backdoor/RAT on GitHub.
  • Crypt its payload with pycrypt
  • Now Convert crypted payload to exe using pyinstaller

Download Python3

*:- For Windows: Download here.

*:- For Linux:

sudo apt-get install python3
sudo apt-get install python3-pip

Make Sure Python3 And Pip are Installed.

  • pip install termcolor
  • pip install requests

How To Run

*:- For Windows:-

Make Sure python3 and pip are installed and requirements also installed

python pycrypt.py

Then give the path of your payload file and enjoy

*:- For Linux:-

Make Sure all requirements are installed.

python3 pycrypt.py

Then enter the path of your payload file and enjoy it on the following platform.

  1. Windows
  2. Linux Based Os

How To Install

git clone https://github.com/pycrypt
cd pycrypt
python3 pycrypt.py

KleenScan Scanner Result

  1. Generated stub.py Result:-
  2. Crypter Code Result:-

Demo Video

Warning: Use this tool only for educational purposes and we will not be responsible for ur cruel act.

Balaji N

Balaji is an Editor-in-Chief & Co-Founder - Cyber Security News, GBHackers On Security & Kali Linux Tutorials.

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

10 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

10 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago