|
1 | | -# ByteCloaker |
| 1 | +[](https://forthebadge.com) |
| 2 | + |
| 3 | +<p align="center"> |
| 4 | + <img src="https://raw.githubusercontent.com/mrfr05t/FileCloaker/master/Images/Main.png?token=GHSAT0AAAAAACAZQZX7LL4PAW2I6C7KKZDGZBHLJGQ"> |
| 5 | +</p> |
| 6 | + |
| 7 | + |
| 8 | +## Overview: |
| 9 | +<p align="center"> |
| 10 | +FileCloaker transforms any filetype (e.g. .zip, .exe, .xls, etc.) into a list of harmless-looking strings in a txt file. This lets you hide the file in plain sight, and transfer the file without triggering alerts. The fancy term for this is "text-based steganography", hiding data by making it look like other data. For example, you can transform a .zip file into a list of Automobiles names or MD5 hashes. You then transfer the cloaked file however you choose, and then decloak the exfiltrated file back into its original form. |
| 11 | +<p align="center"> |
| 12 | +With your payload cloaked, you can transfer data across a secure network’s perimeter without triggering alerts. You can also defeat data whitelisting controls - is there a security device that only allows IP addresses to leave or enter a network? Turn your payload into IP addresses, problem solved. Additionaly, you can derail the security analyst’s review via social engineering attacks against their workflows. And as a final bonus, cloaked files defeat signature-based malware detection tools. |
| 13 | +</p> |
| 14 | +<p align="center"> |
| 15 | +The pre-packaged ciphers are designed to appear like harmless / ignorable lists, though some (like MD5 password hashes) are specifically meant as distracting bait. |
| 16 | +</p> |
| 17 | +<p align="center"> |
| 18 | +FileCloaker is also a great way to introduce people to crypto and steganography concepts. It's simple to use, guides the user through the process, and according to our kids is also fun! |
| 19 | +</p> |
| 20 | + |
| 21 | +## Features: |
| 22 | + |
| 23 | + - Can cloak any type of file |
| 24 | + - Added encryption to precompiled ciphers |
| 25 | + - Creates Meta data file so you can remember from which cipher you cloak the file |
| 26 | + - Create own cipher with predifiend encryption key |
| 27 | + |
| 28 | + |
| 29 | +## Cloaking Screen: |
| 30 | + |
| 31 | +<p align="center"> |
| 32 | + <img src="https://raw.githubusercontent.com/mrfr05t/FileCloaker/master/Images/Cloak.png?token=GHSAT0AAAAAACAZQZX66LEOEZMXZL4R3N22ZBHLWBQ"> |
| 33 | +</p> |
| 34 | +<p align="center"> |
| 35 | + |
| 36 | +## DeCloaking Screen: |
| 37 | +<p align="center"> |
| 38 | + <img src="https://raw.githubusercontent.com/mrfr05t/FileCloaker/master/Images/Decloak.png?token=GHSAT0AAAAAACAZQZX6XEOTHXAJJ5YCYGRMZBHL6DQ"> |
| 39 | +</p> |
| 40 | +<p align="center"> |
| 41 | + |
| 42 | + |
| 43 | +## CHANGE ENCRYPTION KEY: |
| 44 | +- Goto FileCloaker/FileCloaker/Functions/Functions.cs |
| 45 | +``` |
| 46 | +public string EnKey() |
| 47 | + { |
| 48 | + return Varsx.CiphersEncryptionKey = "MAKV2SPBNI99212";// All precompiled ciphers are encrypted with this key be carefull when change this to your own! |
| 49 | + } |
| 50 | +``` |
| 51 | + |
| 52 | + |
| 53 | + ## DEVELOPERS & CREDIT: |
| 54 | + |
| 55 | + - Developer [**Mrfr05t**](https://github.com/mrfr05t) ( I did nothing actually! :D ) |
| 56 | + - Programmer [**Omnimaverick**](https://github.com/Omnimaverick) ( I did nothing actually! :D ) |
| 57 | + - Joe Gervais (TryCatchHCF) |
| 58 | + for developing [**CloakifyFactory**](https://github.com/TryCatchHCF/Cloakify) |
| 59 | + |
| 60 | + |
| 61 | + ## Disclaimer: |
| 62 | +**This tool is supposed to be used only on authorized systems. Any unauthorized use of this tool without explicit permission is illegal.** |
| 63 | + |
| 64 | +## License: |
| 65 | + [**GNU GENERAL PUBLIC LICENSE**](https://github.com/mrfr05t/FileCloaker/blob/master/LICENSE.txt) |
| 66 | + |
| 67 | + |
0 commit comments