Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Kara-4search/DInvoke_shellcodeload_CSharp
ShellCodeLoader via DInvoke
https://github.com/Kara-4search/DInvoke_shellcodeload_CSharp
bypass bypass-antivirus bypass-windows-defender csharp dinvoke redteam shellcodeloader
Last synced: 22 days ago
JSON representation
ShellCodeLoader via DInvoke
- Host: GitHub
- URL: https://github.com/Kara-4search/DInvoke_shellcodeload_CSharp
- Owner: Kara-4search
- Created: 2021-07-02T06:49:19.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2021-07-05T02:31:49.000Z (over 3 years ago)
- Last Synced: 2024-11-19T03:49:09.773Z (24 days ago)
- Topics: bypass, bypass-antivirus, bypass-windows-defender, csharp, dinvoke, redteam, shellcodeloader
- Language: C#
- Homepage:
- Size: 31.3 KB
- Stars: 49
- Watchers: 2
- Forks: 10
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - Kara-4search/DInvoke_shellcodeload_CSharp - ShellCodeLoader via DInvoke (C# #)
README
# DInvoke_shellcodeload_CSharp
Blog link: May not gonna update.
* A ShellcodeLoader base on my another project(https://github.com/Kara-4search/Simple_ShellCodeLoader_CSharp), inspire by TheWover(https://github.com/TheWover).
* The purpose is to bypass EDR 's APIs hook, or danger APIs dectection.
* Use D/Invoke to load shellcode into memory.
* **I removed a lot of unnecessary code from the original project, make the code easy for understanding.**
* You could change the function name or do other magic works make it better for EDR bypassing.
* I only tested it on x86 with the shellcode below(It is a calc shellcode), but it should be able to work on x64.```c#
byte[] codepent = new byte[193] {
0xfc,0xe8,0x82,0x00,0x00,0x00,0x60,0x89,0xe5,0x31,0xc0,0x64,0x8b,0x50,0x30,
0x8b,0x52,0x0c,0x8b,0x52,0x14,0x8b,0x72,0x28,0x0f,0xb7,0x4a,0x26,0x31,0xff,
0xac,0x3c,0x61,0x7c,0x02,0x2c,0x20,0xc1,0xcf,0x0d,0x01,0xc7,0xe2,0xf2,0x52,
0x57,0x8b,0x52,0x10,0x8b,0x4a,0x3c,0x8b,0x4c,0x11,0x78,0xe3,0x48,0x01,0xd1,
0x51,0x8b,0x59,0x20,0x01,0xd3,0x8b,0x49,0x18,0xe3,0x3a,0x49,0x8b,0x34,0x8b,
0x01,0xd6,0x31,0xff,0xac,0xc1,0xcf,0x0d,0x01,0xc7,0x38,0xe0,0x75,0xf6,0x03,
0x7d,0xf8,0x3b,0x7d,0x24,0x75,0xe4,0x58,0x8b,0x58,0x24,0x01,0xd3,0x66,0x8b,
0x0c,0x4b,0x8b,0x58,0x1c,0x01,0xd3,0x8b,0x04,0x8b,0x01,0xd0,0x89,0x44,0x24,
0x24,0x5b,0x5b,0x61,0x59,0x5a,0x51,0xff,0xe0,0x5f,0x5f,0x5a,0x8b,0x12,0xeb,
0x8d,0x5d,0x6a,0x01,0x8d,0x85,0xb2,0x00,0x00,0x00,0x50,0x68,0x31,0x8b,0x6f,
0x87,0xff,0xd5,0xbb,0xf0,0xb5,0xa2,0x56,0x68,0xa6,0x95,0xbd,0x9d,0xff,0xd5,
0x3c,0x06,0x7c,0x0a,0x80,0xfb,0xe0,0x75,0x05,0xbb,0x47,0x13,0x72,0x6f,0x6a,
0x00,0x53,0xff,0xd5,0x63,0x61,0x6c,0x63,0x2e,0x65,0x78,0x65,0x00
};
```* You could use API monitor(http://www.rohitab.com/apimonitor) to test the project, comparing with the SimpleLoader(https://github.com/Kara-4search/Simple_ShellCodeLoader_CSharp), You could see there is no API call via D/Invoke.
* Kernel functions are not good enough,you could even do the ntdll version of this.## Usage
1. Just replace the shellcode.
2. Launch it through some white list applications## Comparing via API monitor
There are mainly 3 APIs we are gonna monitor:
* VirtualAlloc
* CreateThread
* WaitForSingleObject
1. You could see the picture below, the SimpleLoader' s API call caught by API monitor.
![avatar](https://raw.githubusercontent.com/Kara-4search/tempPic/main/APIMon-Result1.png)2. And the **DInvoke ShellcodeLoader**'s API call was not caught by API monitor.
![avatar](https://raw.githubusercontent.com/Kara-4search/tempPic/main/APIMon-Result2.png)## Reference link:
1. https://github.com/CCob/SharpBlock
2. https://ethicalchaos.dev/2020/05/27/lets-create-an-edr-and-bypass-it-part-1/
3. https://ethicalchaos.dev/2020/06/14/lets-create-an-edr-and-bypass-it-part-2/
4. https://thewover.github.io/Dynamic-Invoke/
5. https://offensivedefence.co.uk/posts/dinvoke-syscalls/
6. https://github.com/TheWover/DInvoke
7. http://www.rohitab.com/discuss/topic/38807-api-monitor-v2-r10-release-instant-monitoring-without-definitions-support-for-dllmain-and-early-apis-windows-8/
8. https://vimeo.com/566964438
9. https://docs.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createthread
10. https://docs.microsoft.com/en-us/dotnet/api/microsoft.visualstudio.shell.interop.vsdebugstartupinfo.dwcreationflags?view=visualstudiosdk-2019