Skip to content

decay88/Tengri_Shellcode_Loader

Repository files navigation

Tengri Shellcode Loader

Build Status

Tengri Shellcode Loader is a Cobalt Strike and x86 shellcode Loader builder for use on Red Team and Adversary Simulation engagements.

Current Features:

  • Generate a loader from either DNS or HTTPS shellcode
  • Generate a loader that checks HTTPS connectivity and based on reponse either injects HTTPS or DNS shellcode into memory
  • Add Registry Entry to run loader on Start Up
  • AV Bypass - i've currently only test it with Symantec and one or two others, this needs further validation.

Future Features:

  • Generate a loader that checks both HTTPS and DNS connectivity and if both fails runs an SMTP agent
  • Generate an InstallUtil Function to evade application whitelisting
  • Add Sandbox detection techniques
  • Port to earlier versions of the .NET framework

USE of HTTPS and DNS loader

For this the current way that i have found it to work, is making a text file with some text in side (can be anything), hosting it on the Teamserver (Attacks -> Web Drive-By -> Host File) and to then enter https://redirectordomain/textfile into the connectivity check for the beacon when generating the loader.

This will ensure that it reaches out to HTTPS teamserver if it is reachable

Requirements:

The loader and loader generator require .NET framework v4 to be installed on both the generator's and victim's machine.

You can download .NET framework v4 from here

GUI

It is a GUI application and fairly self explanatory. To run is just run the Tengri_SB.exe in the same folder as the rest of the repo.

The folder structure MUST be maintained for it to work and generated loaders are output into the FinishedLoader folder.

You will need to feed it either Metasploit and Cobalt Strike raw (.bin) x86 shellcode.

The GUI looks like this:

Alt text

About

Encrypted Shellcode Loader Generator

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages