✔️Jlaive
Jlaive is an antivirus evasion tool that can convert executables into undetectable batch files. Obfuscated .NET assemblies are not guaranteed to work.
Telegram: @unipoland
✔️Features
- .NET/Native (x64) support
- AES 256 /XOR encryption
- Compressions
- Anti Debug
- Anti VM
- Melt file (self delete)
- Bind files
- AMSI bypass
- ETW bypass
- API unhooking
✔️Screenshots
✔️DEMO VIDEO
https://www.youtube.com/watch?v=0UGDc53RKGE
✔️Partner
Stitch : https://github.com/nathanlopez/Stitch
AsyncRAT : https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp
DcRat : https://github.com/qwqdanchun/DcRat
ElegyRAT : https://github.com/we1h0/ElegyRAT-C-Sharp
VanillaRAT : https://github.com/DannyTheSloth/VanillaRAT
✔️Known issues
Hidden
option does not work on Windows Terminal.- Not compatible with Python EXE.
✔️To-do
- Remove the use of
Add-Type
for decryption and decompression
✔️Credits
C# RunPE: https://github.com/nettitude/RunPE
SharpUnhooker: https://github.com/GetRektBoy724/SharpUnhooker
✔️Disclaimer
This project was made for educational purposes only. I am not responsible if you choose to use this illegally/maliciously.
Notification
We apologize for the inconvenience. The current program is no longer functional. We recommend you consider and purchase another program from our product portfolio. Thank you for your understanding and support. https://github.com/UniRevendBypass/Universal_Crypter