0% found this document useful (0 votes)
158 views5 pages

Black Trinity Crypter

This document describes the features of the Black Trinity crypter software. It lists over 70 features related to evading detection from antivirus software, firewalls, sandboxes, and debuggers. The crypter is described as very stable and powerful with obfuscation capabilities. It is compatible with Windows 2000 through Windows 8 in 32-bit and 64-bit.

Uploaded by

Michael Petersen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
158 views5 pages

Black Trinity Crypter

This document describes the features of the Black Trinity crypter software. It lists over 70 features related to evading detection from antivirus software, firewalls, sandboxes, and debuggers. The crypter is described as very stable and powerful with obfuscation capabilities. It is compatible with Windows 2000 through Windows 8 in 32-bit and 64-bit.

Uploaded by

Michael Petersen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Black Trinity crypter

+Very Stable

+Very Powerful

+Obfuscator PE

+Bypass Kaspersky Internet Security 2012 (Included) (Proactive Defense)

+Bypass OutPost Firewall

+Bypass Zemana Keylogger (HIPS)

+Bypass Comodo Internet Security (HIPS)

+Bypass AntiHook (HIPS)

+Bypass SpyShelter (HIPS)

+Bypass Avast Antivirus (Proactive)

+Bypass Norton Internet Security (Proactive)

+Bypass Avast Antivirus

+Bypass Eset Nod32

+Bypass GData Internet Security

+Bypass TrustPort Antivirus

+Bypass Panda Internet Security

+Bypass Dr Web Antivirus

+Bypass Avira Internet Security

+Bypass Avg Internet Security

+Bypass AV360

+Bypass BitDefender & 2012+Anti AV Database Update

+Remove AV From Disk

+Major Icon Quality

+Clone File Properties


+Best Binder

+Speed Increase 300%

+Add Vista Resource Manifest

+Anti Avira Heuristic Detection

+Anti Nod32 Heuristic Detection

+Fix Pe Checksum

+Fake Error Generator

+Compatible (Windows 2000 / Xp / Vista / Windows 7 / Windows 8 [32/64Bits] )

+Script Support!

+Process Suspended

+Process Killer

+Run Only in Admin Mode

+Cannot Run in safe Mode

+Anti-Tracing (Anti Craking)

+Set File Atributes

+Anti Kaspersky (Kaspersky Bypass Proactive Defense)

+Binder

+Activex Registration

+Anti Heuristic Detection

+Anti-Firewall (ByPass)

+Vista UAC (ByPass)

+NEW Engine

+Very Stable

+File Bundle (DLL Bundle + Register ActiveX/OLE/COM control)


+Anti-Heuristic Detection

+Obfuscation of your executable helps protect it against tampering and cracking.

*Process Killer (Multiple Process Killer)

*Cannot Run in Safe Mode

*Run Only in Admin Mode

*Set File Attributes

*Anti-Shadow User Pro

*Anti-Clean Slate

*Anti Sandbox (Fortres)

*Run as Fake Process

*Delete Me (Execute & Delete RDG Loader)

*Anti JoeBox (Enhanced)

*Anti-Anubis (Enhanced)

*Anti-CWSandbox (Enhanced)

*Sleep Sec. Run program after x Seconds. 0 to 999 (Enhanced)

*Process Ghost

*Change Process Name

*Anti-Debugger

*Anti-Sandboxie

*Anti-virtualpc

*Realig Sections

*Anti-IDA Debugger

*Anti-CWSandbox

*Anti-Norman Sandbox
*Anti-Anubis

*OEP Stolen Bytes (Enhanced)

*Checksum CRC

*Anti-OllyDbg

*Anti-ThreatExpert

*Anti-JoeBox

*Anti-VMWARE

*Anti-VirtualBOX

*Anti-Debugger2

*Overlay support (EOF Data)

*Sleep Sec. Run program after x Seconds.

*Exceptions (0 to 1000)

*Get All Privileges

*Change Icon (Enhanced)

*OEP Stolen Bytes (Enhanced)

*Anti Virtual Machine (Max) = Heuristic

*Anti-SunBelt Sandbox

*Anti Deep-Freeze

*Anti-Returnil Vistual System

*Anti-Malware Defender

*Anti-Wine(Linux)

*Anti-Xen Virtual Machine

*Password Protect

*Execute With Command Line (parameters)

*UnHook All API


*Anti-Attach Loader (Protect RDG Loder)

*Execute as NT AUTHORITY\SYSTEM

*Restore API

*Unique version + Unique for each Buyer!

*Full support!

*Support: Free 24/7 support when you need it.

*Compatible with Windows 2000 - Xp - Vista - Windows 7

*Support OS 32/64Bits

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy