Syscall proxy type implant, that grants the operator 3 different operations:
- Read memory
- Write memory
- Execute an API function and receive the returned data
This gives the operator full freedom of the execution flow, without relying on dynamic loading of modules, granting the bypass of static analysis of the AV/EDR.
COMPILE ME IN RELEASE MODE!
You should use the client with impacket-like arguments:
python3 main.py user:pass@host <additional arguments>Use it at your own risk, I do not take responsibility of ANYTHING. This software is intended for good uses, human evolution and that things. Also, this code is malware but can be used for multiple purposes, like on-cloud synchronization related things and so on. For example, games running on cloud servers, etc. Anyways, fuck you, we fucking love alien technology, bitch.
For avoiding static signatures you should refer to the polymorphic engine for shellcodes coded by gum3t. Check his repo at https://github.com/gum3t/chameleon