Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/elmerikh/beryl
Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤
https://github.com/elmerikh/beryl
avbypass backdoor backdoor-attacks backdoor-dropper cybersecurity cybersecurity-education dropper exploit hacking-tool payload-generator payload-injector python redteaming redteamtool shellcode-injector shellcode-loader uac-bypass windows windowsdefenderbypass
Last synced: 2 months ago
JSON representation
Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤
- Host: GitHub
- URL: https://github.com/elmerikh/beryl
- Owner: ELMERIKH
- License: mit
- Created: 2023-08-31T16:45:59.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-04-08T22:28:59.000Z (9 months ago)
- Last Synced: 2024-05-30T12:17:58.265Z (8 months ago)
- Topics: avbypass, backdoor, backdoor-attacks, backdoor-dropper, cybersecurity, cybersecurity-education, dropper, exploit, hacking-tool, payload-generator, payload-injector, python, redteaming, redteamtool, shellcode-injector, shellcode-loader, uac-bypass, windows, windowsdefenderbypass
- Language: Python
- Homepage:
- Size: 79.7 MB
- Stars: 7
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: readme.md
- License: LICENSE
Awesome Lists containing this project
README
![Alt text](<2023-08-31 09_57_39-Command Prompt.png>)
Greetings
--------------------Beryl delivers and hides your PE (exe or dll) straight to the victim in form of a game or a no gui and makes it run as admin by trying to priv escalate or just by being run as admin
Shellcode support:
-----------
Beryl supports shellcodeUsage : python .\Beryl.py -d dIRECTORY -n myPE -sh .\shellcode |.\shellcode.bin
persistance feature:
---------------------
it use the task scheduler to create a task named "User_Feed_ESRV" that runs the PE run at logon ,also the PE will run with the highest privilege available at each startup(SYSTEM or Nt/AUthority System)ps: tried this with an AgentTesla trojan PE and it worked fine ;)
GUI support (game):
-------------------
![Alt text](<2024-02-18 12_24_08-Beryl.py - Beryl - Visual Studio Code.png>)Setup:
-------------------pip install -r requirements.txt
Python Beryl.py
usage: Beryl.py [-h]
-------------d DIRECTORY_PATH (in the HOME env of the user)
-url "URL" (url to install your PE)
-n OUTPUT_NAME
[-g {Snake,FlapyBird,Turtle,RaceCar}] (GUI)
-dll "function" (name of function to run with the file if dll type)
-uac makes Beryl run as Uac by default (if UAC and user doesn t execute as admin payload won t be injected and won t run)
-sh make Beryl execute a shellcode instead of downloading a PE , -url not needed in thiscase
To Do :
---------------add some obfuscation
DISCLAIMER :
--------------ME The author takes NO responsibility and/or liability for how you choose to use any of the tools/source code/any files provided. ME The author and anyone affiliated with will not be liable for any losses and/or damages in connection with use of Beryl. By using Beryl or any files included, you understand that you are AGREEING TO USE AT YOUR OWN RISK. Once again Beryl is for EDUCATION and/or RESEARCH purposes ONLY.