A sophisticated PE file crypter and protector written in C++ that provides advanced features for executable protection.
- Strong encryption using AES-256 in CBC mode with secure key generation
- Multiple injection methods:
- Process Hollowing
- APC Injection
- Module Stomping
- Early Bird Injection
- Advanced anti-analysis techniques:
- Anti-debugging protection
- Anti-VM detection
- Sandbox detection
- Timing checks
- Metamorphic engine:
- Code morphing
- Instruction substitution
- Dead code insertion
- Control flow obfuscation
- PE file manipulation:
- Section manipulation
- Import table obfuscation
- Header modification
- Resource encryption
- Modern GUI with progress tracking and detailed options
- Windows 10 or later
- Visual Studio 2022
- CMake 3.15 or later
- Administrator privileges (for certain features)
- Clone the repository:
git clone https://github.com/yourusername/improved_crypter.git
cd improved_crypter- Build the project:
# On Windows
.\build.bat
# On Unix-like systems with Windows cross-compilation
./build.shThe compiled executable will be in build/bin/Release/improved_crypter.exe
- Launch the application with administrator privileges
- Select the input PE file to protect
- Configure protection options:
- Enable/disable metamorphic engine
- Choose injection method
- Configure anti-analysis features
- Set additional protection options
- Select output location
- Click "Build" to create the protected executable
- AES-256 encryption in CBC mode
- Secure random key generation using BCrypt
- Unique IV for each encryption
- Key storage protection
- Debug detection (user-mode and kernel-mode)
- Virtual machine detection
- Sandbox environment detection
- Analysis tools detection
- Timing-based checks
- Metamorphic engine for code transformation
- Control flow obfuscation
- Dead code insertion
- Instruction substitution
- Import table obfuscation
- Process Hollowing: Creates a suspended process and replaces its memory with encrypted payload
- APC Injection: Queues an APC to execute the payload in target process
- Module Stomping: Overwrites an existing module with the payload
- Early Bird: Injects payload during process initialization
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Create a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
This tool is for educational purposes only. Users are responsible for complying with all applicable laws and regulations regarding the use of this software.
- Windows API documentation
- PE format specifications
- Various anti-analysis techniques research papers
- Open source cryptography implementations