Protecting your programs from unwanted analysis since 2009!
Encrypt your programs code
Protect your software from tampering.
Make analysis harder for reverse engineers, software analysts and crackers;
Your executable file code will be completely encrypted.
But when executed, it will work just like before!
Octopus Protector will enhance your protection against:
- Reverse Engineering
- Modifying/Cracking your software
- Software Debuggers
- PE Editors
- Hex Editors
- Other PE analysis software
Maximum compatibility and performance
The small and fast C++ code will run on any Windows from XP to 10, 32-64 bit, including Server versions.
It will not require any dependency to run, just standard system libraries which come with any Windows installation.
- Compatible with almost any native Portable Executable.
- Most of .net executables supported as well.
Unique variant for each customer:
Unlike with most crypters, packers and protectors vendors, which they do offer the same package for every customer, each Octopus User gets his own private variant of the Loader (stub).
The Loader is the code which incapsulates your encrypted exe file.
Each Loader is the core protection of your executable, so an unique variant is sent to each customer, in order to ensure that it will be always something never seen before to any analyst.
Most of crypter vendors share same Loader with all customers, and this makes the Loader code known very soon by reverse engineers and analysis software.
This is NOT the case with Octopus Protector.
When you acquire Octopus, you get a first unique stub, crafted just for you.
You can buy new stubs anytime.
Multiple files in-memory protection and execution:
pack multiple executable files (or dlls) into the same exe, and execute all of them directly in memory altogether.
pack one or multiple DLLs together, and use the Octopus stub as a DLL loader, loading the encrypted DLLs directly in memory when launching executable.
Bind files, and Create Installation Packages:
Pack together multiple files of any type, and drop them on disk;
Autorun file on Windows startup.
Modify behaviour if ran inside an analysis environments
Change behaviour when analysis is detected, to make analysis harder;
This will trick analysis software, and human analysts as well.
Octopus can detect various analisys software, such as Virtual Machines, Sandboxes, Debuggers and more.
When an analysis environment is detected, you can choose to run just some files and not others (Selective File Execution), display a custom message, or auto-terminate the whole process before it performs any significant action.
Download additional software from Internet when opening file.
Change file icon and informations cloning them from another file.