Skip to content

Commit a9c20e4

Browse files
authored
Update README.md
1 parent afb8084 commit a9c20e4

File tree

1 file changed

+67
-1
lines changed

1 file changed

+67
-1
lines changed

README.md

Lines changed: 67 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,67 @@
1-
# ByteCloaker
1+
[![forthebadge](https://forthebadge.com/images/badges/built-with-swag.svg)](https://forthebadge.com)
2+
3+
<p align="center">
4+
<img src="https://raw.githubusercontent.com/mrfr05t/FileCloaker/master/Images/Main.png?token=GHSAT0AAAAAACAZQZX7LL4PAW2I6C7KKZDGZBHLJGQ">
5+
</p>
6+
7+
8+
## Overview:
9+
<p align="center">
10+
FileCloaker transforms any filetype (e.g. .zip, .exe, .xls, etc.) into a list of harmless-looking strings in a txt file. This lets you hide the file in plain sight, and transfer the file without triggering alerts. The fancy term for this is "text-based steganography", hiding data by making it look like other data. For example, you can transform a .zip file into a list of Automobiles names or MD5 hashes. You then transfer the cloaked file however you choose, and then decloak the exfiltrated file back into its original form.
11+
<p align="center">
12+
With your payload cloaked, you can transfer data across a secure network’s perimeter without triggering alerts. You can also defeat data whitelisting controls - is there a security device that only allows IP addresses to leave or enter a network? Turn your payload into IP addresses, problem solved. Additionaly, you can derail the security analyst’s review via social engineering attacks against their workflows. And as a final bonus, cloaked files defeat signature-based malware detection tools.
13+
</p>
14+
<p align="center">
15+
The pre-packaged ciphers are designed to appear like harmless / ignorable lists, though some (like MD5 password hashes) are specifically meant as distracting bait.
16+
</p>
17+
<p align="center">
18+
FileCloaker is also a great way to introduce people to crypto and steganography concepts. It's simple to use, guides the user through the process, and according to our kids is also fun!
19+
</p>
20+
21+
## Features:
22+
23+
- Can cloak any type of file
24+
- Added encryption to precompiled ciphers
25+
- Creates Meta data file so you can remember from which cipher you cloak the file
26+
- Create own cipher with predifiend encryption key
27+
28+
29+
## Cloaking Screen:
30+
31+
<p align="center">
32+
<img src="https://raw.githubusercontent.com/mrfr05t/FileCloaker/master/Images/Cloak.png?token=GHSAT0AAAAAACAZQZX66LEOEZMXZL4R3N22ZBHLWBQ">
33+
</p>
34+
<p align="center">
35+
36+
## DeCloaking Screen:
37+
<p align="center">
38+
<img src="https://raw.githubusercontent.com/mrfr05t/FileCloaker/master/Images/Decloak.png?token=GHSAT0AAAAAACAZQZX6XEOTHXAJJ5YCYGRMZBHL6DQ">
39+
</p>
40+
<p align="center">
41+
42+
43+
## CHANGE ENCRYPTION KEY:
44+
- Goto FileCloaker/FileCloaker/Functions/Functions.cs
45+
```
46+
public string EnKey()
47+
{
48+
return Varsx.CiphersEncryptionKey = "MAKV2SPBNI99212";// All precompiled ciphers are encrypted with this key be carefull when change this to your own!
49+
}
50+
```
51+
52+
53+
## DEVELOPERS & CREDIT:
54+
55+
- Developer [**Mrfr05t**](https://github.com/mrfr05t) ( I did nothing actually! :D )
56+
- Programmer [**Omnimaverick**](https://github.com/Omnimaverick) ( I did nothing actually! :D )
57+
- Joe Gervais (TryCatchHCF)
58+
for developing [**CloakifyFactory**](https://github.com/TryCatchHCF/Cloakify)
59+
60+
61+
## Disclaimer:
62+
**This tool is supposed to be used only on authorized systems. Any unauthorized use of this tool without explicit permission is illegal.**
63+
64+
## License:
65+
[**GNU GENERAL PUBLIC LICENSE**](https://github.com/mrfr05t/FileCloaker/blob/master/LICENSE.txt)
66+
67+

0 commit comments

Comments
 (0)