Do you want to learn how to encrypt files using Base64 crypter (by Tigerzplace) and other techniques? Do you want to understand how antivirus systems can be bypassed by altering the behavior or signature of files? If you’re curious about crypters and their role in cybersecurity, you’re in the right place. In this blog article, I’m excited to share my first-ever Crypter – the B64 Crypter by Tigerzplace. Reflecting on my earlier method of crypting a rat server (crypt njrat with FUD method), where I manually encrypted the file, I decided to streamline and automate the process into a powerful crypter.

This crypter comes with several advancements, including string tweaking in reverse and the addition of polymorphic behavior. I initially developed this tool for my private use about six months ago, and now I’m sharing it with you for educational purposes. As I delved into cryptography and explored the realm of cybersecurity, I found such tools incredibly helpful in understanding where antivirus systems might fail to detect a file and how one can bypass those detections.

If you’re on a similar journey of understanding and navigating the complexities of cybersecurity tools, this blog article aims to provide insights into the world of crypters. Whether you’re interested in the intricacies of encryption or exploring ways to enhance file security, I hope you find this information valuable. Stay tuned for a deep dive into the functionalities and nuances of the B64 Crypter by Tigerzplace.

B64 Crypter by Tigerzplace

B64 Crypter is a crypter that automates the process of encrypting files using Base64 encoding and other methods. A crypter is a software that can modify the code of an executable file to make it undetectable by antivirus programs. Crypters are often used by hackers and malware developers to evade detection and analysis.

However, B64 Crypter is designed to assist cybersecurity enthusiasts and ethical hackers in learning how encryption works and how to deceive antivirus systems, rather than for malicious use. In this article, we will show you how to use B64 Crypter to encrypt any executable file and run it on your computer.

Before getting your hand on the crypter, understanding its working flow will help you in the cyber field. So, for those who are on a white hat and focus on the programming side, then the flow section of Crypt will be helpful. 

How B64 Crypter Works

B64 Crypter works by taking an executable file, converting it to Base64, reversing the string, and using it in obfuscated PowerShell code executed via VBS script. Base64 is a binary-to-text encoding scheme that represents binary data in ASCII text format. PowerShell is a scripting language that can perform various tasks on Windows systems. VBS is a file extension for Visual Basic Script, a scripting language that can run on Windows.

Why B64 Crypter is Useful for Learning

B64 Crypter proves to be a valuable educational tool as it showcases how encryption can effectively conceal the true nature of a file. By encrypting a file, you can change its behavior and signature, which are the main factors that antivirus programs use to identify malicious files. By running the encrypted file, you can see how it bypasses the antivirus detection and performs the same function as the original file.

B64 Crypter also illustrates the utilization of PowerShell and VBS scripts for executing code on Windows systems. These scripts, commonly employed by hackers and malware developers, serve as tools for launching attacks and compromising systems. By understanding how these scripts work, you can learn how to defend yourself and your system from such threats.

B64 Crypter is not a hacking tool, but a learning tool. Its intended use is solely for educational and ethical purposes. Do not use it to encrypt malicious files or harm others. Use it to enhance your knowledge and skills in cybersecurity and ethical hacking.

Encrypt a file with B64 Crypter.

To illustrate how the B64 crypter works, I’ll use an async rat file (I have also tested njrat files; this crypter can encrypt .NET type files). BTW, the method is not just about rat encryption. You can demonstrate the method by encrypting any other file. This method is kind of my private crypter, which I made with the help of NYANxCat’s tool and some Google searching to find an obfuscated PowerShell script.

How you can crypt a rat file/ or another file

  • First of all, you will need to download the crypter (B64 Crypter).
  • Before proceeding, ensure you have Python v3.+ installed, as the crypter is coded in Python. Download and install Python to seamlessly follow the upcoming steps.
  • If you are using any Linux OS, then just update your Python version. Otherwise, you can download it from their official website. The Python official site
blank
  • After downloading, extract the crypter files. They will also contain words.txt. Don’t delete that file. It’s better to open CMD in that location and run the crypter. If you can’t do that, then simply double-click the new crypter file and you will get a terminal.
  • Drag the file you want to encrypt or provide the path of the file that you want to obfuscate.
  • The next, thing is the startup name. As I am demonstrating the encryption on the rat file, the rat file usually drops itself into the startup folder. If you are also using it for the RAT file, then don’t select the startup option while making your payload.

I will not delve into non-educational applications in this article. The goal is to showcase how specific tools can evade antivirus software through the modification or encoding of a file’s behavior or signature. This confusion introduced in the antivirus scan, which heavily relies on file signatures, allows for evasion. By encoding the file using base64 and then utilizing it in VBScript, it becomes more challenging for the antivirus software to identify the file signature. Consequently, the antivirus software fails to detect the file during runtime.

However, if you want to learn more about hacking, ethical hacking, penetration testing, android hacking, or maybe some other type of hacking, you might not know. So here you go, my post link where you will find complete courses for ethical hacking and many more hacking-related courses. 

Complete Courses for Ethical Hacking by HackerSploit

B64 Crypter by Tigerzplace

Conclusion

B64 Crypter is a tool that can encrypt any executable file using Base64 encoding and other techniques. Explore how encryption works and discover methods to fool antivirus systems. Additionally, gain insights into utilizing PowerShell and VBS scripts for executing code on Windows systems.