An innovative, convenient and secure crypto app.
Mar 13, 2021 The undetectable CRYPTER - the one and only! BitCrypter is a high-performance executable packer and protector for native Windows 32-bit programs and.NET apps. The license for Crypter can be purchased online through BMT Micro (for other payment options read below). GPG-Crypter is a graphical front-end to GnuPG(GPG) using the GTK3 toolkit and GPGME library. It has been developed to provide an easy access to GPG encryption and decryption. It supports encryption and decryption of text entered into the program's input fields. It also supports file encryption and decryption.
- CRYPTER comes with a 22-page manual that contains an introduction to cryptography, detailed advice on choosing proper difficulty for your players and making secret messages easier or harder to decipher, an extensive glossary of things and people associated with it, several old-time cipher tools to print out, a bibliography with useful.
- In just a few words, Crypter is a modern and lightweight piece of software that proposes a slick and fast way to encrypt and decrypt files. Easy-to-install app that works on all the key OSes.
Encrypt unlimited bits. Remember only a bit.
Crypter is a cross-platform crypto app that makes encryption and decryptionconvenient while still upholding strong security. It tackles one of the weakestlinks in most security systems today - weak passwords. It simplifies securepassword generation and management and requires you to only remember one bit -your MasterPass.
Crypter v4.0 is a cryptoapp that can decrypt and encrypt any arbitrary data this includes files andfolders. This version has been released and fully tested for macOS (OSX), Linux(for all distros via AppImage) and Windows (32 & 64bit). All core modules (modules that provide the core functionality) are fullytested.
Crypter v5.0 will save your MasterPassin your OS's Keychain so you won't have to enter it every time you open the app.To help speed up the development please send a PR for what's left do https://github.com/HR/Crypter/milestone/4
Please open an issue if you have any suggestions and add improvements via PRs!
Also checkout Ciphora (https://github.com/HR/ciphora)a decentralized end-to-end encrypted messaging app.
Link to this README: https://git.io/Crypter.info
- Crypto
- CRYPTO file
- Security
- FAQs
- Development
Installation
All prebuilt binaries for all major platforms are available underreleases.
Crypter is also on Homebrew Cask formacOS. So to install it, simply run the following command in the Terminal:
Screens
Crypto
One key to derive them all!
Crypter derives a MasterPassKey from the MasterPass obtained at setup by usingthe PBKDF2 key derivation algorithm (see below for the specification). Itthen uses PBKDF2 to derive a number of encryption keys from the MasterPassKeythat can be used for the encryption of files. This method allows for thegeneration of very secure encryption keys for data encryption. Moreover, bypublicly storing the credentials used to derive the MasterPassKey and the saltsused to derive the encryption keys, you are able to produce the encryption keysat will and without needing to store them securely. Your MasterPass is the onlything that you need to remember.
![Cached Cached](/uploads/1/1/8/9/118959387/714510322.png)
Crypter never directly encrypts anything with your MasterPass. Instead, itderives a MasterPassKey from it, which it then uses to derive theencryption key used to encrypt your file. Every time a file is decrypted,the encryption key is re-derived from the MasterPassKey. Every time you set theMasterPass through the setup or reset it through Verify MasterPass, theMasterPassKey is derived from the MasterPass using a newly generated set of(random) credentials. These credentials are used to re-derive the MasterPassKeyevery time that Crypter is executed (i.e. the app is launched).
Authentication with the AES-256-GCM symmetric block cipher is used by default.This ensures that data integrity is verified on decryption and allows the appto detect tampering or data corruption.
The following are the crypto defaults and can be found under
app/config.js
:Encryption process
When encrypting a file, Crypter first creates a temporary hidden directory,namely '.crypting'. It then encrypts the user-selected file with the cryptodefaults and flushes the encrypted data to a file in the directory, namely'data'. If it is a directory then it is compressed first (tar). It also writesthe public credentials to a file within the same directory, namely 'creds'.Finally, Crypter compresses the directory to a tar archive with the name of theuser-selected file and the '.crypto' extension appended to it.
Decryption process
The decryption process is essentially the inverse of the encryption process.During decryption, Crypter creates a temporary hidden directory named'.decrypting'. It then reads the credentials from the creds file and decryptsthe data file into the original file or directory (after decompressing it) withits original name and extension, as deduced from the CRYPTO file name (e.g. theextension for 'file.txt.crypto' would be '.txt').
Public credentials
Certain credentials are required to decrypt the encrypted data. These areneeded to reconstruct the particular encryption key and to verify data integrity.These can be stored publicly without compromising security since it is fairlyimpossible (by current standards) to reconstruct the encryption key without theMasterPass and its credentials. These credentials are stored in the creds file ofthe CRYPTO file archive (as delineated above) in the followingformat:
v1
v2
Uses JSON
The
dir
part is only included for directoriesCRYPTO file
Format
A CRYPTO file is the product of the Crypter encryption process. This filestores both the encrypted version of the user file and the public credentialsneeded to encrypt and decrypt it. It has a
.crypto
file extension, whichis appended to the full file name (including the extension) of the fileoriginally encrypted. The file itself is a tar archive in the followingstructure:Crypteron
Reusing the same MasterPass
If you attempt to decrypt a CRYPTO file by resetting to a specificMasterPass or setting an identical MasterPass on a different machine,you will likely encounter the following error:
This issue occurs because the MasterPassKey that was originally used toderive the encryption key on is not the same as the MasterPassKeyderived with the reused MasterPass. Since Crypter uses randomness togenerate secure credentials, this second set of credentials will be quitedifferent from the original set. As a result, the derived encryption key isincorrect and yields this error.
See Achieving portability and same MasterPass reusefor instructions on how to successfully reuse the same MasterPass.
Achieving portability and same MasterPass reuse
To achieve portability on Crypter, the set of MasterPassKey credentialsneed to be exported from Crypter on the source machine1and imported into Crypter on the target machine2. https://cyclelasopa188.weebly.com/steam-64-bit-mac-download.html.
This can be achieved in two simple steps:
- Export MasterPass credentials on the source machine1
- Import MasterPass credentials on the target machine2
Please refer to the FAQs for instructions on how to perform the above steps.
Battle cats mac download. [1] The machine where the CRYPTO file was initiallyencrypted.
[2] The machine where you wish to decrypt the CRYPTOfile.
Security
Security-first practice
Crypter follows a security-first practice. This means that security is itshighest priority and first consideration. Thus, while Crypter seeksto make encryption more convenient, it always defers to maintaininga high level of security.
MasterPass
Crypter never stores your MasterPass in memory or on the filesystem. Thissubstantially improves the security of your MasterPass. You are only asked toenter the MasterPass when you first set, reset or verify it. Whenever you enteryour MasterPass, Crypter derives a MasterPassKey (using a set of generatedcredentials) and then immediately discards the MasterPass. The MasterPassKey isthen securely stored in memory and used to derive the encryption keys. Sincethese credentials are derived via a one-way function, they cannot be used inany way to derive the MasterPass.
MasterPassKey
Crypter uses a WeakMap to store the MasterPassKey inside the MasterPassKey classusing a closure function. This makes the MasterPassKey data held in the object(externally) inaccessible, consequently increasing the protection of theMasterPassKey. The MasterPassKey is never flushed to the filesystem and is alwaysstored in (main) memory. Since JS does not give control over or allow such alow-level operation as wiping memory, the program relies on the garbagecollection and volatility of the main memory for the permanent erasure of theMasterPassKey stored in memory.
A decent number of iterations (see the above specifications) are used in thederivation of the MasterPassKey to mitigate brute-force attacks. A goodamount of iterations are also used during the derivation of the encryptionkeys from the MasterPassKey. Consequently, performance and speed are notsignificantly compromised. For critical applications, you may choose toselect 10,000,000 iterations instead of the default number(in app/core/crypto.js). Please refer tohttp://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-132.pdf formore information.
Crypter generates a new set of random credentials for deriving the MasterPassKeyevery time the MasterPass is set (at setup) or reset. Crypter employs randomnessto mitigate brute-force attacks and thus drastically improve security.
FAQs
How do I encrypt a file or folder?
If you haven't already, walk through the setup and set your MasterPass.To encrypt a file or folder, first launch Crypter and verify your MasterPass.After doing so successfully, you will see the main Crypter window with an orangearea. Here, you can simply drag-and-drop or click to select the file/folder youwish to encrypt. Once Crypter is done encrypting your file/folder, it will showyou the encryption information (i.e. the encryption key and the path of theencrypted file) in a new window. To encrypt another file/folder simply click theback arrow at the bottom left and start-over ;)
How do I decrypt a CRYPTO file?
The following instructions assume that the CRYPTO file that you wish todecrypt is being used with the same MasterPass that you set at setup and alsothat you have not reset it since that time. If this is not the case, please referto Reusing the same MasterPass.
To decrypt a CRYPTO file, first launch Crypter and verify your MasterPass. Afterdoing so successfully, you will see the main Crypter window with an orange area.Here, you can simply drag-and-drop or click to select the CRYPTO file that youwish to decrypt. After a few seconds, the process will complete and you will seesome information about the file and its original encryption in a new window. Bydefault, the decrypted file has the same name as the name of the original file(i.e. the encrypted file name without the
.crypto
at the end).How do I encrypt multiple files?
Crypter can encrypt an entire folder so you can put them in a folder or,alternatively, compress them into an archive (like a
.zip
) and then just passit to Crypter ;)Why am I getting the 'Corrupted Crypter file or trying to decrypt on a different machine.' error?
This error means that either your Crypter file (i.e. the
data
file) iscorrupt/tempered, that you are on a different machine than the one originallyused to encrypt the file or that you have previously reset your MasterPass.For the last two cases, please refer toReusing the same MasterPass andAchieving portability and same MasterPass reuse.Why can't I decrypt a CRYPTO file on a different machine with the same MasterPass?
Please refer to Reusing the same MasterPass andAchieving portability and same MasterPass reuse
Why can't I decrypt a CRYPTO file with the same MasterPass?
Please refer to Reusing the same MasterPass andAchieving portability and same MasterPass reuse
Where are my encrypted/decrypted files/folders placed?
By default, every source file that you encrypt/decrypt gets encrypted/decryptedto the same directory where the source file is located.
How can I access Crypter's preferences?
You can access Crypter's preferences by either clicking on the cog icon in themain Crypter window or by going to
Crypter > Preferences..
from the menu.How can I reset my MasterPass?
You can reset your MasterPass by clicking on the 'Forgot it' link in the VerifyMasterPass window. This takes you to a new screen where you can enter a new, validMasterPass. Once you've entered it, click the 'Reset' button and you'll be sentback to the verify screen where you can verify your new MasterPass.
What is a valid MasterPass?
Crypter will not allow you to set an invalid MasterPass. A MasterPass is validwhen it adheres to the following rules: Pop games for mac.
- It is at least 8 characters long
- It has at least one uppercase alphabetic character (A-Z)
- It has at least one lowercase alphabetic character (a-z)
- It has at least one numeric character (0-9)
- It has at least one special character ($@!%*#?&)
These rules are enforced via the following regular expression:
What are MasterPass credentials?
MasterPass credentials are a set of values that are required to derive theMasterPassKey from the MasterPass. These values have a pseudo-random element andare cryptographically linked. Every MasterPass that is set or reset with Crypterhas a unique set of MasterPass credentials. These yield a distinct MasterPassKey,even when a MasterPass is reused.
How can I export my MasterPass credentials?
To export your MasterPass credentials, you can first open Crypter'spreferences (see above). From this screen, click on the 'Export' button. Adialog will appear from which you can select the folder where you wish to exportthe credentials. A success message will confirm a successful export. Theexported MasterPass credentials file is always named
credentials.crypter
.How can I import my MasterPass credentials?
To import a set of MasterPass credentials, you can first open Crypter'spreferences (see above). From this screen, click on the 'Import' button. Adialog will appear from which you can locate your
credentials.crypter
file.After you select it, a success message will confirm a successful import andyou will have to verify the MasterPass for the credentials.NOTE: while Crypter does not require the MasterPass credentials file to beexactly named
credentials.crypter
, it does require the file's contents tobe unaltered from when it was exported from Crypter. If it has been altered,the import may fail.Development
Crypter is developed in the 'dev' branch, which may be unstable at times.This branch should typically be used for pull requests.
The 'master' branch will always be kept stable.
Configurations
All major configurations that you can apply are found under
app/config.js
.This includes changes to certain cryptography settings. Please be advisedthat altering these may break functionality andportability.Install (dependencies)
To install all dependencies, run:
Run
Since Crypter uses gulp, please install it globally if you have not alreadydone so. To start Crypter, run:
Test
Crypter primarily uses mocha and chai for testing. Since the project uses alot of JS ES6 syntax, babel is also used as a transpiler. To run all the tests,execute:
Crypter uses istanbul for coverage. To run test coverage, execute:
Build
Crypter's binaries (available under releases) have been built usingElectron. Since Crypter uses electron-builder to build binaries,you must install it globally:
To build the app for macOS, run:
To build the app for Linux, run:
To build the app for Windows x84 and/or x64, run:
License
The MIT License (MIT)
Copyright (c) Habib Rehman (https://git.io/HR)
Permission is hereby granted, free of charge, to any person obtaining a copyof this software and associated documentation files (the 'Software'), to dealin the Software without restriction, including without limitation the rightsto use, copy, modify, merge, publish, distribute, sublicense, and/or sellcopies of the Software, and to permit persons to whom the Software isfurnished todo so, subject to the following conditions:
The above copyright notice and this permission notice shall be included inall copies or substantial portions of the Software.
Crypterium Wallet
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS ORIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THEAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHERLIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS INTHE SOFTWARE.
Client Options:
+ multiple binder/crypter/packer/downloader/delayed execution/parameter support
+ multiple run/scan-time downloader
+ binded files and urls are hight crypted with your custom encryption-autogenerate random password for each binded file, you can also chose password level
+ command line/delayed execution for each binded/crypted file/url
+ various anti methods by SqUeEzEr, Karcrack and me
+ add a custom stub/fake message/delayed execution
+ change icon/null pe info/change pe entry point/add new pe section/fix pe checksum/null pe icon/anti padding/EOF data saver/Zero EntryPoint
+ clone pe icon, clone pe info, clone pe time.
+ activex/HKLM/HKCU startup, drop file to temp/windows/system32/system/drivers+ set file attribute to hidden, system and read only
+ you can chose randomize level 1-slow, 2 medium, 3-hard
+ pack with UPX
+ crypt file: yes/no/reverse file
+ run file yes/no
+ startup yes/no
+ anti methods yes/no
+ file pumper
+ auto save eof
+ file time stamp
+ drop binded/downloaded files to temp/appdata/windows/system32/system/drivers
+ inject binded files to this exe/explorer/services/svchost/internet explorer/default browser(use inject file for bypass avs on run-time)
+ autosave custom stub/client settings, so you don't need to chose them every time
+ multiple run/scan-time downloader
+ binded files and urls are hight crypted with your custom encryption-autogenerate random password for each binded file, you can also chose password level
+ command line/delayed execution for each binded/crypted file/url
+ various anti methods by SqUeEzEr, Karcrack and me
+ add a custom stub/fake message/delayed execution
+ change icon/null pe info/change pe entry point/add new pe section/fix pe checksum/null pe icon/anti padding/EOF data saver/Zero EntryPoint
+ clone pe icon, clone pe info, clone pe time.
+ activex/HKLM/HKCU startup, drop file to temp/windows/system32/system/drivers+ set file attribute to hidden, system and read only
+ you can chose randomize level 1-slow, 2 medium, 3-hard
+ pack with UPX
+ crypt file: yes/no/reverse file
+ run file yes/no
+ startup yes/no
+ anti methods yes/no
+ file pumper
+ auto save eof
+ file time stamp
+ drop binded/downloaded files to temp/appdata/windows/system32/system/drivers
+ inject binded files to this exe/explorer/services/svchost/internet explorer/default browser(use inject file for bypass avs on run-time)
+ autosave custom stub/client settings, so you don't need to chose them every time
The crypter came with one Unique Stub Generator:
USG extra options one:
USG extra options two:
Unique Stub Generator is used for generate your own unique fud stubs, the engine of usg 1.4 is fully changed from the usg 0.7(public release)
Unique Stub Generator 1.4 Options:
+16 stub encryptions:
blowfish, twofish, aes, tea, huffman, base64, gost, des, skipjack, cryptapi, ds1, ds2, proba, ultra, rc4 and xor
+ code polymorphism
+ 3 APIs encryptions : Xor/Rc4/Ro2
+ 8 strings encryptions: Ascii, hex, xor, rot, reverse, hybrid, base64, x6
+ 3 limiters, for more unique rate
+ all encryptions class modules are full randomized
+ added Huffman, one compression/encryption algorithm, so this is also a packer
+ all strings/functions/variables/constants and version info are randomized
+ all functions place in (clas)module(s) are full randomized
+ all possible strings are crypted with one custom encryption and String Ecnryption(Rot/Ascii/Xor/Hex)
+ all apis are crypted with APIs encryption(Xor/Rc4/None)
+ you can chose randomize level 1 -slow, 2 -medium, 3 -hard
+ add fake functions/junk code/APIs
+ you can put your custom limiters/resource name
+ scramble codes (add goto variables)
+ scramble codes (method two)
+ custom code scrambler
+ add fake useless apis, add real useless apis
+ you can put your custom resource language for each res
+ you can chose betwen RtlMoveMemory and vbacopybytes
+ you can chose betwen LoadLibrary and LdrLoadDll
+ you can chose betwen CallApiByName, CallApiByPtr, CallApiByHash, Invoke and Zombie Invoke
+ you can chose to 'declare used apis' or to 'use type library'
+ you can chose betwen LoadResource and LoadResData
+ you can chose betwen one resource and three resources
+ remove the code of: downloader, anti methods, startup, anti debugger, anti virtual machines, anti generic emulator, ani generic sandboxie, fake message, get default browser, delayed execution
+ add fake functions (method one)
+ add fake functions(method two)
+ advanced ascii options:chr$/chr, &/+
+ startup object: sub main or form load
+ extra options: randomize project name, version number, company name, product name and internal name
+ add fake components: forms, modules, user controls, property pages and class modules
+ chr$, mid$, left$, right$, ucase$, string$ ($ are used for 'make' function more fast than default)
+ to each component add: real apis, fake apis, junk codes, functions, variables, subs and types
+ custom anti emulator (you can use your own anti emulator code)
+ compile options: fast compilation, no compile msg, auto-compile, create new folder for each stub and you can chose how many stubs to generate
+ stub can be compiled in P-Code or Natie-Code
+ USG GUI is optimized for laptop customers
+ auto save/load usg settings
Fly Crypter public release detection rate:
hackhound.org/forum/index.php?topic=38726.0
youtube.com/watch?v=k32I4lAuRlk
Fly Crypter anti methods for each file unique concept:
youtube.com/watch?v=tXj7ypTXjes
Remember:
+ I don't allow mass spreading(crypting service, youtube spreading, etc)
+ You will receive all next updates for free in your e-mail inbox, you don't need to pay for next updates.**
+ You can sugest me to add some new options/features.
+ FC has no unicode support.
+ I update USG allmost every week, in last release all bugs are fixed.
+ I check each Hwid via team viewer, for be sure it's really your copy and you don't leak it
Functionality:
+ works in all x86 and x64 NT operating systems.
+ this application can crypt all cryptable files(rats/stealers/bots/etc).
Extra Features:
+ This is the first crypter that bypass kaspersky proactive defence even if startup is used, all other crypters are detected in run-time as GenericTrojan.PDM by kaspersky proactive defence if startup is used.
+ This is the first crypter that has implemented anti methods for each file
+ This crypter bypass kaspersky 'safe run' and any sandboxie environment
+ This crypter has one unique stub generator that has many advanced options, so you can build unlimited unique and fully custom stub
Allways fud settings
The Price is:40 Euro/60 USD(75 USD for liberty reserve) for one year updates/support.**
Pay methods: Liberty Reserve, AlertPay, Money Bookers, Plimus, Western Union, Bank Transfer and Money Gram
Automatically buy:
If you're interested then contact me at:[email protected]
**I've bought one private smtp server for send updates, so your email will allways be delivered.
Crypter Github
(c) [S]imply [T]he [W]orst Company |