Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Genetic-Malware/Ebowla
Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)
https://github.com/Genetic-Malware/Ebowla
clueless-agents golang memorymodule powershell python
Last synced: about 5 hours ago
JSON representation
Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)
- Host: GitHub
- URL: https://github.com/Genetic-Malware/Ebowla
- Owner: Genetic-Malware
- License: other
- Created: 2016-04-07T22:29:58.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2019-01-28T10:45:15.000Z (almost 6 years ago)
- Last Synced: 2024-11-03T04:32:41.552Z (17 days ago)
- Topics: clueless-agents, golang, memorymodule, powershell, python
- Language: Python
- Homepage:
- Size: 34.6 MB
- Stars: 737
- Watchers: 56
- Forks: 167
- Open Issues: 10
-
Metadata Files:
- Readme: README.md
- License: LICENSE.md
Awesome Lists containing this project
- cybersources - ebowla
- cybersources - ebowla
README
# NO LONGER SUPPORTED
# EBOWLA
```
USAGE: ./ebowla.py exe_dll_shellcode genetic.configThen: Compile your code
```### Known Issues
The current version is locked into golang version <= 1.9.5 known working on golang 1.6: https://github.com/Genetic-Malware/Ebowla/issues/23
If someone wants to update the codebase to support LDFlags for golang 1.9+ we accept pull requests!
MSF x86 EXE file output not compatible with MemoryModule (use DLL or x64 EXE/DLL)
https://github.com/Genetic-Malware/Ebowla/issues/12Powershell output was tested on powershellv5
### Presentation Resources
Slides:
Infiltrate 2016: https://github.com/Genetic-Malware/Ebowla/raw/master/Infiltrate_2016_Morrow_Pitts_Genetic_Malware.pdf
Ekoparty 2016: https://github.com/Genetic-Malware/Ebowla/blob/master/Eko_2016_Morrow_Pitts_Master.pdf
Demos:
Demo1:
https://www.youtube.com/watch?v=rRm3O7w5GHgDemo2:
https://youtu.be/Bu_qDrbX9ZoDemo3:
https://youtu.be/mlh70LtwmDoDemo4 (PowerShell):
https://youtu.be/lyedtAtATGc### Contact:
```
twitter:
@wired33
@midnite_runr
```# Documentation
```
https://github.com/Genetic-Malware/Ebowla/blob/master/documentation.md
Also read genetic.config```
# Payload Support
|Payload|Python|GO|PowerShell(tested on v5)
|:-----|:-----|:----|:----|
|Reflective DLL| x32 / x64 - None| x32 / x64 - In Memory| x32 / x64 - In Memory|
|DLL| x32 / x64 - None| x32 / x64 - In Memory| x32 / x64 - In Memory|
|EXE| x32 / x64 - On Disk| x32 / x64 - In Memory| x32 / x64 - In Memory|
|Shell Code| x32 / x64 - In Memory| x32 / x64 - In Memory| x32 / x64 - In Memory|
|Python Code| x32 / x64 - In Memory| x32 / x64 - None| None|
|Powershell code|None|None|Yes|
|File Drop| Yes | In Progress | Yes |
### Creditshttps://github.com/vyrus001/go-mimikatz
https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-ReflectivePEInjection.ps1
https://github.com/PowerShellMafia/PowerSploit/blob/master/CodeExecution/Invoke-Shellcode.ps1
### Contributing
If you have a bug report, submit an issue. Include the OS that you tested everything on, including the server (victim).
Output of commands we like:
```
Windows:
systeminfo
Linux:
uname -a
```If you want to contribute code please do so. We ask that you actually submit something substantial, fixing spacing doesn't count, or making our code fully pep8.
Look at our issues for ideas where you can help: https://github.com/Genetic-Malware/Ebowla/issues
secretsquirrel is on IRC #freenode as midnite_runr
### Contributors
https://github.com/wired33 (wrote most of the golang payload code)
https://github.com/secretsquirrel (wrote the python payload code and most of the encryption code)