https://github.com/5noxi/omni-crypter
Uses AES-256 encryption and advanced obfuscation (base64 & reversed, math, bxor...) to make it hard to read or reverse your code (includes AMSI bypass). It supports compression, ensures unique keys/variables. Uses MBA obfuscarted commands/strings!
https://github.com/5noxi/omni-crypter
aes-256 aes-encryption amsi-bypass crypter encrypt encryption mixed-boolean-arithmetic obfuscate obfuscator powershell reverse reverse-engineering reversed tool xencrypt
Last synced: 4 months ago
JSON representation
Uses AES-256 encryption and advanced obfuscation (base64 & reversed, math, bxor...) to make it hard to read or reverse your code (includes AMSI bypass). It supports compression, ensures unique keys/variables. Uses MBA obfuscarted commands/strings!
- Host: GitHub
- URL: https://github.com/5noxi/omni-crypter
- Owner: 5Noxi
- License: gpl-3.0
- Created: 2024-12-31T14:25:18.000Z (6 months ago)
- Default Branch: main
- Last Pushed: 2025-01-07T13:46:58.000Z (6 months ago)
- Last Synced: 2025-01-08T18:19:21.034Z (5 months ago)
- Topics: aes-256, aes-encryption, amsi-bypass, crypter, encrypt, encryption, mixed-boolean-arithmetic, obfuscate, obfuscator, powershell, reverse, reverse-engineering, reversed, tool, xencrypt
- Language: PowerShell
- Homepage: https://discord.gg/E2ybG4j9jU
- Size: 2.43 MB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Omni-Crypter
Uses AES-256 encryption and advanced obfuscation (base64 & reversed, math, bxor, mixed boolean arithmetic...) to make it hard to read or reverse your code (includes AMSI bypass). It supports compression, ensures unique keys/variables. Uses MBA obfuscarted commands/strings!**Preview:**


### Before

### After
## Discord Server
- https://discord.gg/E2ybG4j9jU## READ
**Don't be a kiddo**, I uploaded the script *open source and for free*, stealing it now would be **unbelievable** ;D *(sad)*## Features
- Multi-layer **AES-256** encryption.
- Supports `Gzip` and `Deflate` compression
- String and control flow obfuscation
- AMSI bypass (b64 encoded & reversed, also used mba obfuscated commands)
- **Extremely Randomized** variable names & decrypter stub *(Reversed/shuffled)* - **Obfuscates all commands/strings with MBA (mixed boolean artihmetric), then obfuscates them even further with math techniques**
- **Comment** confusion / randomized comments for additional obfuscation *(everywhere ;D)*
- **Each layer** gets different commands *(MBA obfuscated)*
- Adjustable **encryption iterations**
- **Math-Based** and Encoding Obfuscation
- Includes techniques like `Base64&Reversed`, `Bitwise XOR`, `Math` and more
- **Unique key** generation for each encryption layer *(highly randomized)*
- **Extremely annoying & hard to reverse ;D**## MBA obfuscation example for `Invoke-Expression`
```
([char]((2523 - 2614 - 4746 + 4910))+[char](((-11723 -Band 2744) + (-11723 -Bor 2744) + 5845 + 3212))+[char]((11829 - 7353 + 2004 - 6394))+[char](((-14684 -Band 1130) + (-14684 -Bor 1130) + 5795 + 7838))+[char](((7790 -Band 1401) + (7790 -Bor 1401) - 5316 - 3800))+[char](((-7002 -Band 6060) + (-7002 -Bor 6060) + 3195 - 2184))+[char](((-14009 -Band 471) + (-14009 -Bor 471) + 4103 + 9480))+[char](((-13817 -Band 3144) + (-13817 -Bor 3144) + 4911 + 5831))+[char](((-16107 -Band 2812) + (-16107 -Bor 2812) + 8813 + 4570))+[char](((-4302 -Band 1864) + (-4302 -Bor 1864) + 3535 - 1017))+[char]((10571 - 7774 - 7320 + 4605))+[char]((10896 - 84 - 4290 - 6453))+[char](((-5952 -Band 7714) + (-5952 -Bor 7714) - 556 - 1123))+[char]((6883 - 4942 + 6048 - 7906))+[char](((6261 -Band 7411) + (6261 -Bor 7411) - 9728 - 3871))+[char](((-16021 -Band 9058) + (-16021 -Bor 9058) + 5225 + 1817))+[char](((-9394 -Band 3249) + (-9394 -Bor 3249) + 5744 + 479)))
```## Usage
`nvi` -> Input`nvo` -> Output
`. \NV-Omni-Crypter.ps1;nvcrypter -nvi "\Test.ps1" -nvo "\Encrypted.ps1" -Iterations 2`
## Disclaimer
**I'm not responsible for any misuse of this tool!** *(don't encrypt any harmful code with it...)*## Credits
Credits to [SecForce](https://x.com/SECFORCE_LTD) for the base idea & structure