Thanks to visit codestin.com
Credit goes to github.com

Skip to content

NT-TNT/ufo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

UFO

Syscall proxy type implant, that grants the operator 3 different operations:

  • Read memory
  • Write memory
  • Execute an API function and receive the returned data

This gives the operator full freedom of the execution flow, without relying on dynamic loading of modules, granting the bypass of static analysis of the AV/EDR.

COMPILE ME IN RELEASE MODE!

You should use the client with impacket-like arguments:

python3 main.py user:pass@host <additional arguments>

Use it at your own risk, I do not take responsibility of ANYTHING. This software is intended for good uses, human evolution and that things. Also, this code is malware but can be used for multiple purposes, like on-cloud synchronization related things and so on. For example, games running on cloud servers, etc. Anyways, fuck you, we fucking love alien technology, bitch.

Avoiding static signatures

For avoiding static signatures you should refer to the polymorphic engine for shellcodes coded by gum3t. Check his repo at https://github.com/gum3t/chameleon

About

Syscall proxy implant

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published