- Update: Improved the main file. First update in a while and probably the last for another while.
Windows-based application downloads a binary file from a server using WinHTTP and executes it by copying it to memory and invoking it with a function pointer. This should only be intended for ethical purposes.
- Downloads a binary file from a remote server using HTTP protocol and WinHTTP library.
- Executes the downloaded binary by copying it to memory and invoking it with a function pointer.
- Control Flow Obfuscation
- String Obfuscation (not working as of updating this)
I don't condone using this tool for any kind of malicious activity
(if the project doesn't compile, you can edit the compiler and add any missing directories.)
NORMAL:
CONTROL FLOW OBFUSCATION:
Other notes: CFO = Control Flow Obfuscation
- Interactable python script
- Process Injection
- Dll compiler
- Loop until successful fetch of shellcode