A desktop application for encrypting and obfuscating Windows executables with advanced anti-analysis techniques and in-memory execution capabilities.
Built with Rust, Svelte 5, and Tauri v2.
This tool is designed for educational and research purposes only. It implements advanced encryption and obfuscation techniques that could be misused. Use responsibly and only in controlled environments. The authors are not responsible for any misuse or damage caused by this software.
- Multi-layer Encryption: ChaCha20-Poly1305 AEAD encryption with configurable layers
- Key Encapsulation: ECC-based key exchange and encapsulation
- Metamorphic Code Generation: Dynamic stub generation to evade detection
- Memory-Resident Execution: No decrypted data written to disk
- Anti-Analysis Techniques: Debugger detection, environment checks, and obfuscation
- Build Profiles: Minimal, Balanced, and Aggressive obfuscation levels
- Runtime Modes: Reflective loading, process hollowing, and direct execution
- Cryptographic Engine: Multi-layer encryption using ChaCha20-Poly1305
- PE Reconstruction: Windows executable parsing and manipulation
- Metamorphic Generation: Dynamic code generation to evade detection
- Anti-Analysis: Techniques to detect and respond to debugging/analysis attempts
- Runtime Execution: Reflective loading and process manipulation
- Modern UI built with shadcn-svelte components
- File selection and build configuration interface
- Real-time build status and statistics
- Error handling with user-friendly messages
MIT License - See LICENSE file for details.
Remember: This tool is for educational purposes only. Understand the implications of executable encryption and obfuscation techniques before use.