Skip to content

免杀360,火绒的Python-shellcode加载器,可直接生成可执行文件exe

License

Notifications You must be signed in to change notification settings

langsasec/c2-shellcode-py

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

38 Commits
 
 
 
 
 
 

Repository files navigation

c2-shellcode-py

免杀360,火绒的Python-shellcode加载器,可直接生成可执行文件exe

image

停更

为保证付费社群利益,本项目停更:https://mp.weixin.qq.com/s?__biz=MzI1ODM1MjUxMQ==&mid=2247493072&idx=1&sn=3e4c49d4e9d09d8ef94d8db96b6ad13d&chksm=ea0bd1c0dd7c58d6a559107f2d113cb8ad97be06bf1e7a4079c91994195a7ebb507d4ec9165d#rd

2023 6.4更新

浪飒loader.exe更新,g了及时反馈,不然我咋更新

https://github.com/langsasec/c2-shellcode-py/tree/main/%E6%B5%AA%E9%A3%92loader

2023.4.28更新

BypassAV-langsa.py你懂得,注意多了个requirement

2023.4.23更新

浪飒loader由于hash死的所以火绒也g了

2023.4.6更新

Bypass.py运行直接生成exe,还可免杀360,无法免杀火绒,火绒3.28病毒库绕过,3.30号病毒库已收录

BypassAV-浪飒.py运行直接生成exe,已再次绕过最新火绒,360成功上线,其他杀软状况自测。

image-20230406175849221

image-20230406180709358

image-20230406175937624

2023.3.29更新

上传样本过多,导致部分杀毒在打包完毕在长时间后会被记录,请重新运行代码生成及时上线即可

2023.3.27更新

没有更改代码,发现腾讯电脑管家金山毒霸也可绕过

image-20230327210233644

image-20230327210540922

使用

CS4.7生成python类型shellcode

image-20230323173046659

保存为payload.py与Bypass.py/BypassAV-浪飒放在一个目录下

image-20230323174256475

等待运行完毕,在dist目录下会生成exe。

image-20230323174911474

上传目标机器运行直接上线

image-20230323172532350

某60

image-20230323175059233

某绒

image-20230323175351079

About

免杀360,火绒的Python-shellcode加载器,可直接生成可执行文件exe

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published