KleenScan Ad Space Available

PolyCrypt 

Web-Based Polymorphic Runtime Crypter


 Features

PolyCrypt offers many features and options. Read below:



 Injection

The injection method used to crypt your file and evade antivirus software.


 Subsystem

Select which Subsystem the final crypted file should be
Windows (GUI): for executables that have GUI interface or hidden GUI.
Console (CUI): for console based executables.


 Output

Select which Output extension the final crypted file should be.
Note: make sure to enter Shortcut Name when selecting .lnk!


 Custom Binary

To upload a Custom Binary to clone its Icon, Assembly Info, Resource & Certificate.


 Icon Changer

To customize and change the look of the crypted file. Recommended for better Scantime results!


 Assembly

To change the description and information about the crypted file. you can type any custom values or clone from Custom Binary you choose.


 Manifest

The Manifest file allows you to inform how Windows treat your executable, for example to only make it run as Administrator.

asInvoker: The application will run with the same permissions as the process that started it. The application can be elevated to a higher permission level by selecting Run as Administrator.

highestAvailable: The application will run with the highest permission level that it can. If the user who starts the application is a member of the Administrators group, this option is the same as requireAdministrator. If the highest available permission level is higher than the level of the opening process, the system will prompt for credentials.

requireAdministrator: The application will run with administrator permissions. The user who starts the application must be a member of the Administrators group. If the opening process is not running with administrative permissions, the system will prompt for credentials.

be careful when you clone manifest file from another binary, as it may corrupt your file and won't let it run in some cases. It is safe to use a custom one though.


 Extras

Copy all resources from Custom Binary

Copies all resources available from the Custom Binary you choose. May possibly corrupt your file because of copied manifest too. use with caution. (must disable Icon, Assembly & Manifest Settings to use)

Replace DOS Header

Modifies a binary file by replacing the first 64 bytes of its DOS header with custom values. Adds a standard DOS stub that displays the message "This program cannot be run in DOS mode" when executed in DOS. This is commonly found in Windows executables. Use with caution as modifying the DOS header may potentially corrupt the file.

Randomize Section Names

Modifies a PE file by renaming its sections to random, commonly used section names. This can be useful for obfuscation purposes. Use with caution as this can potentially corrupt the file.

Fix Checksum

Fixes the checksum in PE files. This function updates the checksum in the PE header to ensure it is correct. Use with caution to avoid issues with critical files.

Patchy

Patchy modifies PE files by applying various obfuscation techniques. These include introducing anti-debugging measures, adding delays, padding the binary with extra data, adjusting function code, and more. It also updates metadata such as timestamps and checksums. By randomizing elements and injecting additional functions, Patchy makes reverse engineering more challenging. Use with caution, as some changes may impact file stability or lead to corruption.


 Signing

To sign your final crypted output with either spoofed certificate from a hostname or clone from Custom Binary you choose.

Some hostname don't allow you to do that, however when it fails to spoof it will show an error and your key won't be consumed.

Some files are also protected from cloning their signature.

Spoofed or cloned certificates are not valid by any chance, do not attempt to create fake programs or abuse. This is for experimental testing and security research only.

Including a spoofed or cloned fake signature may possibly increase or decrease evasion chance for some antivirus software.