{"id":14638193,"url":"https://github.com/pumpbin/pumpbin","last_synced_at":"2025-04-06T21:16:00.710Z","repository":{"id":245258583,"uuid":"813476638","full_name":"pumpbin/pumpbin","owner":"pumpbin","description":"🎃 PumpBin is an Implant Generation Platform.","archived":false,"fork":false,"pushed_at":"2024-07-16T04:14:09.000Z","size":2425,"stargazers_count":303,"open_issues_count":0,"forks_count":33,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-03-30T19:07:12.389Z","etag":null,"topics":["adversarial-attacks","application","bypass-antivirus","c2","command-and-control","cybersecurity","iced","implant","linux","macos","offensive-security","redteam","rust","security","security-tools","shellcode","shellcode-injection","shellcode-injector","shellcode-loader","windows"],"latest_commit_sha":null,"homepage":"https://pumpbin.b1n.io","language":"Rust","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/pumpbin.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-06-11T06:55:16.000Z","updated_at":"2025-03-26T07:55:58.000Z","dependencies_parsed_at":null,"dependency_job_id":"fb643a44-5a90-49f8-ad38-aef06a90f030","html_url":"https://github.com/pumpbin/pumpbin","commit_stats":null,"previous_names":["pumpbin/pumpbin"],"tags_count":7,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pumpbin%2Fpumpbin","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pumpbin%2Fpumpbin/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pumpbin%2Fpumpbin/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pumpbin%2Fpumpbin/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/pumpbin","download_url":"https://codeload.github.com/pumpbin/pumpbin/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247550691,"owners_count":20956987,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["adversarial-attacks","application","bypass-antivirus","c2","command-and-control","cybersecurity","iced","implant","linux","macos","offensive-security","redteam","rust","security","security-tools","shellcode","shellcode-injection","shellcode-injector","shellcode-loader","windows"],"created_at":"2024-09-10T02:01:55.434Z","updated_at":"2025-04-06T21:16:00.693Z","avatar_url":"https://github.com/pumpbin.png","language":"Rust","readme":"\u003cdiv align=\"center\"\u003e\n  \u003ca href=\"https://github.com/pumpbin/pumpbin/releases/latest\"\u003e\n    \u003cimg alt=\"GitHub Release\" src=\"https://img.shields.io/github/v/release/pumpbin/pumpbin?sort=semver\u0026filter=v*.*.*\u0026display_name=tag\u0026style=for-the-badge\u0026labelColor=%2324273a\u0026color=%238aadf4\"\u003e\u003c/a\u003e\n    \n  \u003ca href=\"https://github.com/pumpbin/pumpbin/stargazers\"\u003e\n  \u003cimg alt=\"GitHub Repo stars\" src=\"https://img.shields.io/github/stars/pumpbin/pumpbin?style=for-the-badge\u0026labelColor=%2324273a\u0026color=%23f5bde6\"\u003e\u003c/a\u003e\n  \n  \u003ca href=\"https://github.com/pumpbin/pumpbin/issues\"\u003e\n  \u003cimg alt=\"GitHub Issues or Pull Requests\" src=\"https://img.shields.io/github/issues/pumpbin/pumpbin?style=for-the-badge\u0026labelColor=%2324273a\u0026color=%23ed8796\"\u003e\u003c/a\u003e\n\n  \u003ca href=\"https://github.com/pumpbin/pumpbin/blob/main/LICENSE\"\u003e\n    \u003cimg alt=\"GitHub License\" src=\"https://img.shields.io/github/license/pumpbin/pumpbin?style=for-the-badge\u0026labelColor=%2324273a\u0026color=%23eed49f\"\u003e\u003c/a\u003e\n  \n  \u003ca href=\"https://x.com/b1nhack\"\u003e\n  \u003cimg alt=\"X (formerly Twitter) Follow\" src=\"https://img.shields.io/twitter/follow/b1nhack?style=for-the-badge\u0026logo=x\u0026label=FOLLOW\u0026labelColor=%2324273a\u0026color=%237dc4e4\"\u003e\u003c/a\u003e\n\u003c/div\u003e\n\n# 🎃 PumpBin\n\n\u003cp align=\"center\"\u003e\n  \u003cimg src=\"logo/pumpbin-256x256.png\" height=\"30%\" width=\"30%\"\u003e\n\u003c/p\u003e\n\n**PumpBin** is an Implant Generation Platform.\n\nTo use PumpBin, you need to have a b1n file or [Create One](https://pumpbin.b1n.io/dev/start.html).\\\nA b1n file contains one or more binary implant templates, along with some Extism Plug-in and some additional descriptive information.\\\nWe usually refer to b1n file as Plugin and wasm file as Extism Plug-in.\n\nThe [plug-in](https://github.com/pumpbin/plug-in) repository collects reusable PumpBin Extism Plug-in.\n\n![](https://github.com/pumpbin/pumpbin/assets/120295547/7f4a662e-3a78-4b16-a7bc-7f55d3369ec2)\n\n## ✨ Features\n\n- Powerful, simple, and comfortable UI\n- Following the minimal principle to ensure maximum flexibility in usage\n- Support two Plugin types: `Local` and `Remote`\n- Support Extism Plug-in System, offering powerful extensibility\n- Each generated implant has a different random encryption key\n- Populated with randomized data, each generated implant is unique\n- We have user manual, you no longer need to educate your users\n- No dependencies, just PumpBin\n- Support description, you can write anything about this Plugin\n- No network connection(excluding Extism Plug-in)\n- ... And I'm PumpBin, I have magic🪄\n\n## 🚀 Getting Started\n\nCheck the [PumpBin Documentation](https://pumpbin.b1n.io) for more information.\n\n## ❔ Why\n\nModern cybersecurity teams are divided into offensive personnel and cybersecurity researchers,\nwith researchers responsible for producing digital weapons.\nThe teams typically deploy post-exploitationtools like Cobalt Strike, BRC4, or similar.\nTo evade security software, researchers usually write shellcode loaders, including evasion code to create the final implant.\nThis process generally follows two methods.\n\n1. Offensive personnel provide the shellcode to researchers, who then directly produce the final implant.\n   This method is highly inflexible as offensive personnel must contact researchers every time they need a final implant.\n\n1. Researchers create a binary implant template and provide a final implant generation program.\n   Offensive personnel use this program to inject shellcode into the binary implant template, producing the final implant.\n\nThe second method is the reason for the creation of PumpBin, a final implant generation program.\nCybersecurity researchers only need to follow PumpBin's guidelines to write implant templates and\ndistribute them along with PumpBin to offensive personnel. (There are very few guidelines as PumpBin is highly flexible.)\n","funding_links":[],"categories":["Rust"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpumpbin%2Fpumpbin","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fpumpbin%2Fpumpbin","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpumpbin%2Fpumpbin/lists"}