Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Reflective PE packer.

License

NotificationsYou must be signed in to change notification settings

EgeBalci/amber

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation


Inroduction

Amber is a position-independent(reflective) PE loader that enables in-memory execution of native PE files(EXE, DLL, SYS...). It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products, and application white-listing mitigations. Reflective payloads generated by Amber can either be staged from a remote server or executed directly in memory much like a generic shellcode. By default, every generated payload is encoded using the new generationSGN encoder. Amber usesCRC32_API andIAT_API for inconspicuously resolving the Windows API function addresses. After the PE file is loaded and executed in memory, the reflective payload is erased for evading memory scanners.

Installation

Pre-compiled binaries can be found underreleases.

Building From Source

The only dependency for building the source is thekeystone engine, followthese instructions for installing the library. Once libkeystone is installed on the system, simply just go get it ツ

go install github.com/EgeBalci/amber@latest

Docker Install

Docker

docker pull egee/amberdocker run -it egee/amber

Usage

The following table lists switches supported by the amber.

SwitchTypeDescription
-f,--filestringInput PE file.
-o,--outstringOutput binary payload file name.
-eintNumber of times to encode the generated reflective payload
--iatboolUse IAT API resolver block instead of CRC API resolver block
-lintMaximum number of bytes for obfuscation (default 5)
--sysboolPerform raw syscalls. (only x64)
--scrapeboolScrape magic byte and DOS stub from PE.

Example Usage

  • Generate reflective payload.
amber -f test.exe
  • Generate reflective payload with IAT API resolver and encode the final payload 10 times.
amber -e 10 --iat -f test.exe

Docker Usage

docker run -it -v /tmp/:/tmp/ amber -f /tmp/file.exe

Demo


[8]ページ先頭

©2009-2025 Movatter.jp