Giter Site home page Giter Site logo

augustus's Introduction

Augustus

Evasive Golang Loader

Augustus

Augustus is a Golang loader that execute shellcode utilizing the process hollowing technique with anti-sandbox and anti-analysis measures. The shellcode is encrypted with the Triple DES (3DES) encryption algorithm.

Full EDR bypass with any C2 Framework. Tested with Cobalt Strike against MDE EDR.

Key Features:

  • 3DES Encryption
  • Sandbox Evasion
  • Analysis Evasion
  • Execution delay
  • Process Hollowing

TIP: I recommended to sign the binary with CS

CS:

CS

MSF: MSF

augustus's People

Contributors

tunnelgre avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

augustus's Issues

seems to be not working

Hello, I was testing it with different Cobalt strike payloads but didn't get any logs or sessions on my VM's. Compilation was without problems or errors. Could u provide some advice how to start it correctly?

Provide examples of shellcode generation

Thanks for the tool, would it be possible to provide examples of shell-code generation, i have been trying multiple approaches, but no dice in getting shellcode execution, i have tried simple msgbox, and other more complex with CS and MSF.

Here are my steps i have used.

  • Payloads tested (metasploit, x64 reverse_shell_tcp, x86_reverse_shell_tcp, msgbox, adduser) everything generated in C format
  • Tested with Cobalt Strike 4.8, C staged and stageless shellcodes
  • go version go1.21.0 linux/amd64
  • go run 3DESEncryptor.go, and then enter the values in the main.go at the specific places for IV, SC, KEY
  • no specific sandboxing processes are running that could break the execution flow
  • Compile "env GOOS=windows GOARCH=amd64 go build -x -trimpath -o ./main.exe main.go"
  • No connectivity issue, it can reach internet or the local network.
  • Execute on the victim machine, no reverse shell or no pop-ups.
  • Machines are Windows 10 Updated, administrative access, 8gb of ram 4 cpu, 128gb of hard drive.

Again thanks for your help

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.