Help
Not sure what todo? Read below on how to use crypter.xyz and what each feature does!
How To Use:
using crypter.xyz to crypt your files has never been easier! It's as easy as X Y Z!
X: Select a file to crypt in the main tab. Insert your key, Choose your settings & click Crypt!
Y: Wait for your file while its being crypted.
Z: Copy and save the Zip password & Download your crypted file!
Features Explained:
Injection Method
The method used to crypt your file and evade anti-virus software.
Heuristic Bypass
Heuristic Bypass to bypass modern AV techniques of detecting files. It is nessesary to use.
Obfuscation Level
The amount of obfuscation to apply. Obfuscation makes it nearly Impossible to unpack your crypted files!
Custom Binary
To upload a Custom Binary to clone its Icon, Assembly Info, Resource & Certificate.
Icon Changer
To customize and change the look of the crypted file. Recommended for better Scantime results!
Assembly
To change the description and information about the crypted file. you can type any custom values or clone from Custom Binary you choose.
Manifest
The Manifest file allows you to inform how Windows treat your executable, for example to only make it run as Administrator.
asInvoker: The application will run with the same permissions as the process that started it. The application can be elevated to a higher permission level by selecting Run as Administrator.
highestAvailable: The application will run with the highest permission level that it can. If the user who starts the application is a member of the Administrators group, this option is the same as requireAdministrator. If the highest available permission level is higher than the level of the opening process, the system will prompt for credentials.
requireAdministrator: The application will run with administrator permissions. The user who starts the application must be a member of the Administrators group. If the opening process is not running with administrative permissions, the system will prompt for credentials.
be careful when you clone manifest file from another binary, as it may corrupt your file and won't let it run in some cases. It is safe to use a custom one though.
Extras
Copy all resources from Custom Binary.
Copies all resources available from the Custom Binary you choose. May possibly corrupt your file because of copied manifest too. use with caution. (must disable Icon, Assembly & Manifest Settings to use)
Signing
To sign your final crypted output with either spoofed certificate from a hostname or clone from Custom Binary you choose.
Some hostname don't allow you to do that (crypter.xyz for example), however when it fails to spoof it will show an error and your key won't be consumed.
Some files are also protected from cloning their signature.
Spoofed or cloned certificates are not valid by any chance, do not attempt to create fake programs or abuse. This is for experimental testing and security research only.
Including a spoofed or cloned fake signature may possibly help to increase evasion chance for some anti-viruse software.