https://github.com/mawg0ud/phantomx
an advanced EDR evasion framework in Golang
https://github.com/mawg0ud/phantomx
cybersecurity encryption evasion infosec infosectools shellcode stealth syscalls
Last synced: 4 months ago
JSON representation
an advanced EDR evasion framework in Golang
- Host: GitHub
- URL: https://github.com/mawg0ud/phantomx
- Owner: mawg0ud
- Created: 2025-02-22T07:47:19.000Z (4 months ago)
- Default Branch: main
- Last Pushed: 2025-02-23T04:08:39.000Z (4 months ago)
- Last Synced: 2025-02-23T05:19:04.888Z (4 months ago)
- Topics: cybersecurity, encryption, evasion, infosec, infosectools, shellcode, stealth, syscalls
- Language: Go
- Homepage:
- Size: 2.93 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: docs/README.md
Awesome Lists containing this project
README
# PhantomX - Advanced EDR Evasion Framework
PhantomX is an advanced **EDR (Endpoint Detection and Response) evasion tool** built in **Golang**, designed to bypass modern security defenses using **memory evasion, shellcode encryption, direct syscalls, and anti-debugging techniques**.
## 1. Features
↦ **Memory Evasion** – Unhooks API functions and hides malicious execution.
↦ **Shellcode Encryption** – Encrypts shellcode with **AES & XOR** to evade detection.
↦ **Direct Syscalls** – Executes system calls **without API hooks**.
↦ **Anti-Debugging** – Detects debuggers and sandboxes before execution.
↦ **Cross-Platform** – Works on **Windows, Linux, and macOS**.
↦ **Automated Compilation** – Supports **cross-compilation** with optimized binaries.## 2. Project Structure
```
PhantomX/
│── src/
│ │── main.go # Main entry file
│ │── memory_evasion.go # Handles memory evasion techniques
│ │── shellcode_loader.go # Loads and executes shellcode
│ │── encryption.go # Encrypts/decrypts shellcode
│ │── anti_debugging.go # Implements anti-debugging & sandbox checks
│ │── syscalls.go # Implements direct system calls
│ └── utils.go # Utility functions (config loading, file handling)
│
│── shellcode/
│ │── reverse_shellcode.go # Reverses shellcode before execution
│ └── shellcode_xor.go # Shellcode encryption using XOR
│
│── build/
│ └── compile.go # Compilation script
│
│── docs/
│ └── README.md # Documentation
│
└── config/
└── settings.json # Configuration file for customization
```## 3. Installation & Setup
### **🔹 Prerequisites**
- Install **Golang** (version 1.20+ recommended)
- Windows users: Install **MinGW** for cross-compilation
- Linux/macOS users: Ensure **gcc** is installed### **🔹 Clone the Repository**
```sh
git clone https://github.com/mawg0ud/PhantomX.git
cd PhantomX
```### **🔹 Compile PhantomX**
To compile the project for your current OS:
```sh
go build -o phantomx src/main.go
```For cross-compilation (Windows binary from Linux/macOS):
```sh
GOOS=windows GOARCH=amd64 go build -o phantomx.exe src/main.go
```For Linux binary from Windows:
```sh
GOOS=linux GOARCH=amd64 go build -o phantomx src/main.go
```## 4. Usage
Run PhantomX with default settings:
```sh
./phantomx
```Run with a custom configuration file:
```sh
./phantomx -config config/settings.json
```To execute encrypted shellcode manually:
```sh
go run src/shellcode_loader.go -file shellcode/payload.bin
```## 5. Legal Disclaimer
This tool is for **educational purposes** only. **Unauthorized use of this tool on third-party systems is illegal**. The developers are **not responsible** for any misuse.## 6. License
PhantomX is released under the **MIT License**.## 7 Future Enhancements
- **Process Hollowing** – Injecting payload into legitimate processes.
- **Polymorphic Shellcode** – Generate dynamic payloads on execution.
- **Kernel-Level Evasion** – More advanced techniques to bypass monitoring.