This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several different sources.
Written by Larry Spohn (@Spoonman1091) Payload written by Ben Mauch (@Ben0xA) aka dirty_ben
Bypassing Application Whitelisting using MSBuild.exe - Device Guard Example and Mitigations http://subt0x10.blogspot.com/2016/09/bypassing-application-whitelisting.html @subTee
Bypassing Virtualization and Sandbox Technologies https://www.trustedsec.com/may-2015/bypassing-virtualization-and-sandbox-technologies/ @HackingDave
Sleeping Your Way out of the Sandbox https://www.sans.org/reading-room/whitepapers/malicious/sleeping-sandbox-35797 Hassan.firstname.lastname@example.org
v1.03 Cleaned up the output of the payload creation to make it easier to read and copy & paste.
v1.02 Fixed logic in creation of a new msbuild.rc resource script
v1.01 Added "Custom PS1 Payload" option.
v1.0 Initial Release
pip install -r requirements.txt
Setting up samba shares:
apt-get install samba
- add the following to the bottom of the file (change as appropriate)
[payloads$] comment = Dirty Payloads path = /opt/shares/payloads browsable = yes guest ok = yes read only = yes
service smbd restart