Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/hlldz/SpookFlare
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
https://github.com/hlldz/SpookFlare
antivirus-evasion antivirus-testing av-bypass av-evasion bypass dropper endpoint-bypass loader obfuscation
Last synced: 21 days ago
JSON representation
Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
- Host: GitHub
- URL: https://github.com/hlldz/SpookFlare
- Owner: hlldz
- License: apache-2.0
- Archived: true
- Created: 2017-11-13T17:22:12.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2019-05-08T09:03:45.000Z (over 5 years ago)
- Last Synced: 2024-11-03T02:33:01.709Z (about 1 month ago)
- Topics: antivirus-evasion, antivirus-testing, av-bypass, av-evasion, bypass, dropper, endpoint-bypass, loader, obfuscation
- Language: Python
- Homepage:
- Size: 76.2 KB
- Stars: 946
- Watchers: 50
- Forks: 190
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - hlldz/SpookFlare - Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures. (Python)
README
# SpookFlare
SpookFlare has a different perspective to bypass security measures and it gives you the opportunity to bypass the endpoint countermeasures at the client-side detection and network-side detection. SpookFlare is a loader/dropper generator for Meterpreter, Empire, Koadic etc. SpookFlare has obfuscation, encoding, run-time code compilation and character substitution features. So you can bypass the countermeasures of the target systems like a boss until they "learn" the technique and behavior of SpookFlare payloads.
* Obfuscation
* Encoding
* Run-time Code Compiling
* Character Substitution
* Patched Meterpreter Stage Support
* Blocked powershell.exe Bypass```
___ ___ ___ ___ _ _____ _ _ ___ ___
/ __| _ \/ _ \ / _ \| |/ / __| | /_\ | _ \ __|
\__ \ _/ (_) | (_) | ' <| _|| |__ / _ \| / _|
|___/_| \___/ \___/|_|\_\_| |____/_/ \_\_|_\___|Version : 2.0
Author : Halil Dalabasmaz
WWW : artofpwn.com, spookflare.com
Twitter : @hlldz
Github : @hlldz
Licence : Apache License 2.0
Note : Stay in shadows![*] You can use "help" command for access help section.
SpookFlare > list
ID | Payload | Description
----+------------------------+------------------------------------------------------------
1 | meterpreter/binary | .EXE Meterpreter Reverse HTTP and HTTPS loader
2 | meterpreter/powershell | PowerShell based Meterpreter Reverse HTTP and HTTPS loader
3 | javascript/hta | .HTA loader with .HTML extension for specific command
4 | vba/macro | Office Macro loader for specific command```
## Installation
```
# git clone https://github.com/hlldz/SpookFlare.git
# cd SpookFlare
# pip install -r requirements.txt
```## Technical Details
https://artofpwn.com/spookflare.html## Usage Videos and Tutorials
* SpookFlare HTA Loader for Koadic: https://youtu.be/6OyZuyIbRLU
* SpookFlare PowerShell/VBA Loaders for Meterpreter: https://youtu.be/xFBRZz78U_M
* v1.0 Usage Video: https://www.youtube.com/watch?v=p_eKKVoEl0o### Note
I developed the SpookFlare and technique for use in penetration tests, red team engagements and it is purely educational. Please use with responsibility and stay in shadows!### Acknowledgements and References
Special thanks to the following projects and contributors.
* https://github.com/rapid7/metasploit-framework
* https://github.com/zerosum0x0/koadic
* https://github.com/EmpireProject/Empire
* https://github.com/Veil-Framework/Veil
* https://github.com/nccgroup/demiguise