Advanced cross-platform payload generator and crypter with FUD capabilities
Features • Installation • Usage • Examples • Contributing
OSRipper is a sophisticated, fully undetectable (FUD) backdoor generator and crypter that specializes in creating advanced payloads for penetration testing and red team operations. Built with a focus on macOS M1 architecture, it also supports Linux environments with cutting-edge evasion techniques.
- 🔒 Fully Undetectable (FUD) - Advanced evasion techniques bypass modern AV solutions
- 🎭 Multi-Layer Obfuscation - Proprietary obfuscation engine with randomized variables
- 🌐 Staged Payloads - Double-staged web delivery for enhanced stealth
- 🔐 Encrypted Communications - SSL/TLS encrypted C2 communications
- 👻 Rootkit Behavior - Process masquerading and system integration
- 🔧 Modular Architecture - Extensible plugin system for custom payloads
- Bind Shell Backdoors - Opens ports on victim machines for direct connection
- Reverse TCP Meterpreter - Encrypted reverse connections with SSL/TLS
- Custom Code Crypter - Obfuscate and encrypt any Python script
- Silent BTC Miner - Stealthy cryptocurrency mining capabilities
- Staged Web Delivery - Multi-stage payload delivery via HTTP
- Advanced Obfuscation - Multi-layer code obfuscation with random variables
- Anti-VM Detection - Sandbox and virtual machine evasion
- Process Masquerading - Disguise as legitimate system processes
- Persistence Mechanisms - Automatic startup and system integration
- Signature Randomization - Every generated payload is unique
- Ngrok Integration - Automatic tunnel creation for easy access
- C2 Server - Built-in command and control server
- Data Exfiltration - Automated victim data collection and transmission
- Multi-Protocol Support - TCP, SSL, HTTP delivery methods
- System Information - Complete hardware and software enumeration
- Credential Harvesting - Browser passwords, SSH keys, cloud credentials
- File System Access - Remote file upload/download capabilities
- Keylogging - Real-time keystroke capture
- Screen Capture - Remote desktop monitoring
- Clipboard Access - Clipboard content monitoring
- Python Payload: 0/68 Detection Rate
- Compiled Binary: 0/68 Detection Rate
- Python 3.6 or higher
- Metasploit Framework (for listeners)
- Git
# Install dependencies
sudo apt update && sudo apt install git python3 python3-pip metasploit-framework -y
# Clone repository
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper
# Run setup
sudo python3 setup.py
# Install dependencies (requires Homebrew)
brew install python3 git
# Clone repository
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper
# Run setup
sudo python3 setup.py
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper
pip3 install -r requirements.txt
sudo python3 main.py
Module | Description | Use Case |
---|---|---|
1 | Bind Backdoor | Direct connection to victim machine |
2 | Encrypted TCP Meterpreter | Reverse connection with encryption |
3 | Custom Code Crypter | Obfuscate existing Python scripts |
4 | Silent BTC Miner | Cryptocurrency mining payload |
5 | Staged Meterpreter | Web-delivered multi-stage payload |
-
Generate Payload
sudo python3 main.py # Select module 2 (Recommended) # Configure LHOST and LPORT # Choose obfuscation options
-
Deploy Payload
- Transfer generated binary to target
- Execute on target system
- Payload connects back to your listener
-
Establish Connection
# Metasploit listener automatically starts meterpreter > sysinfo meterpreter > shell
┌─────────────────┐
│ Generated │
│ Binary │
└─────────────────┘
│
│ Execute
▼
┌──────────────────┐
│ Obfuscated │
│ Dropper │
└──────────────────┘
│
│ HTTP GET
▼
┌─────────────────┐
│ │
│ C2 SERVER │
│ │
└─────────────────┘
│
│ Download
▼
┌─────────────────┐
│ Meterpreter │
│ Stage 1 Payload│
└─────────────────┘
│
│ Establish
▼
┌─────────────────┐
│ Encrypted │
│ C2 Channel │
└─────────────────┘
Enable automatic tunnel creation for easy remote access:
# During setup, provide your Ngrok API key
# Get free API key: https://dashboard.ngrok.com/api
Add custom icons to your payloads for better disguise:
# During compilation, specify icon path
Enter .ico path to set a custom icon: /path/to/icon.ico
- Nuitka: High-performance Python compiler
- PyInstaller: Cross-platform executable creator
- Custom obfuscation: Multi-layer code protection
- FUD payload generation (0/68 detection)
- Multi-layer obfuscation engine
- Staged web delivery system
- C2 server implementation
- Anti-VM detection
- Process masquerading
- Credential harvesting
- Ngrok integration
- Enhanced post-exploitation modules
- Advanced persistence mechanisms
- Custom C2 protocol implementation
- Mobile platform support
- AI-powered evasion techniques
- Blockchain-based C2 infrastructure
- Zero-day exploit integration
- Advanced social engineering payloads
We welcome contributions from the security research community!
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature
) - Commit your changes (
git commit -m 'Add amazing feature'
) - Push to the branch (
git push origin feature/amazing-feature
) - Open a Pull Request
- Follow PEP 8 coding standards
- Add docstrings to all functions
- Test on multiple platforms
- Ensure FUD capabilities remain intact
- Wiki - Comprehensive documentation
- Installation Guide - Detailed setup instructions
- Usage Examples - Practical use cases
- API Reference - Developer documentation
Special thanks to the security research community and these projects:
- htr-tech/PyObfuscate - Obfuscation inspiration
- cedowens/SwiftBelt - macOS enumeration
- Metasploit Framework - Payload handling
IMPORTANT: This tool is developed for educational purposes and authorized penetration testing only.
- ✅ Authorized Use: Security research, penetration testing, red team exercises
- ❌ Prohibited Use: Unauthorized access, malicious activities, illegal purposes
The developers are not responsible for misuse of this software. Users must comply with all applicable laws and regulations.
- 🐛 Bug Reports: Open an Issue
- 💡 Feature Requests: Discussions
- 📧 Security Issues: Contact maintainers privately
Made with ❤️ by the OSRipper Team
Star ⭐ this repository if you found it useful!