{"id":23421555,"url":"https://github.com/evilbytecode/payloadcrypter","last_synced_at":"2025-07-15T20:41:55.197Z","repository":{"id":244123738,"uuid":"814280619","full_name":"EvilBytecode/PayloadCrypter","owner":"EvilBytecode","description":"Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.","archived":false,"fork":false,"pushed_at":"2024-06-12T20:40:42.000Z","size":28,"stargazers_count":42,"open_issues_count":0,"forks_count":7,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-03-26T08:37:32.813Z","etag":null,"topics":["antivirus-evasion","av-evasion","crypter","evasion","fud","go","golang","hacking","linux","payload-crypt","payload-crypter","red","red-team","red-tools"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EvilBytecode.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-06-12T17:33:47.000Z","updated_at":"2025-01-19T23:02:21.000Z","dependencies_parsed_at":"2024-06-13T02:14:43.579Z","dependency_job_id":"c463dc3e-3bf2-4155-b0ff-202a8276923f","html_url":"https://github.com/EvilBytecode/PayloadCrypter","commit_stats":null,"previous_names":["evilbytecode/payloadcrypter"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPayloadCrypter","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPayloadCrypter/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPayloadCrypter/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPayloadCrypter/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EvilBytecode","download_url":"https://codeload.github.com/EvilBytecode/PayloadCrypter/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248578864,"owners_count":21127713,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["antivirus-evasion","av-evasion","crypter","evasion","fud","go","golang","hacking","linux","payload-crypt","payload-crypter","red","red-team","red-tools"],"created_at":"2024-12-23T02:16:02.669Z","updated_at":"2025-07-15T20:41:55.185Z","avatar_url":"https://github.com/EvilBytecode.png","language":"Go","readme":"# PayloadCrypter\n## Telegram:\n- https://t.me/ebytelabs\nmake your scripts into payload, and undetectable from VT.\n![image](https://github.com/EvilBytecode/PayloadCrypter/assets/151552809/d8e47232-2673-4894-9cca-dcc74e907aa6)\n\n### Features:\n- **Powershell to Batchfile Conversion:** Converts a PowerShell script into a Batch file.\n- **Python Payload Crypter:** Obfuscates Python scripts with multiple layers of base64 encoding.\n- **Powershell Payload Crypter:** Obfuscates PowerShell scripts with multiple layers of base64 encoding.\n- **JavaScript Crypter:** Obfuscates JavaScript files using `eval(atob())` for multiple layers of encoding.\n- **Batchfile Obfuscator:** Obfuscates Batch files by substituting characters with variable names.\n- **Layers:** Of Obfuscation, can add how many you want.\n\n### Languages Supported:\n- **Powershell**\n- **Python**\n- **JavaScript**\n- **Batch files (Windows Command Scripts)**\n\n### READ :\n- this was made to evade detections from static scanners, like virustotal and many more, thats why its only base64 + it was made for educational purposes.\n\n### Output examples are in a OutputExamples directory.\n\n### future\n- xor since its way better lol\n\n\n## License\nThis project is licensed under the MIT License. See the LICENSE file for details.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fpayloadcrypter","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fevilbytecode%2Fpayloadcrypter","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fpayloadcrypter/lists"}