Credit zaneGittins & Ne0nd0g
- CreateFiber
- CreateProcess
- CreateProcessWithPipe
- CreateRemoteThread
- CreateRemoteThreadNative
- CreateThread
- CreateThreadNative
- EarlyBird
- EnumerateLoadedModules
- EtwpCreateEtwThread
- NtQueueApcThreadEx-Local
- RtlCreateUserThread
- Syscall
- UuidFromString
- An independent HEX Code.
- GO-LANG Installed in System.
- Some basic Go-Lang knowlodge
- Packeges of this repo installed // go get ....
- At first put donut.exe(donut.exe), pe2hex.exe(pe2hex.exe) and your payload in same folder.
- Start donut.exe -f {{your_payload}} // It will create independet payload.bin binary.
- Start pe2hex.exe -h {{payload.bin}} //It will create an independent hex.txt which is hex code.
- Use this HEX code in go lang file update already existing hex code.
- Run the file. Using Go run {file.go}
- https://blog.sunggwanchoi.com/eng-uuid-shellcode-execution/
- https://github.com/Adepts-Of-0xCC/VBA-macro-experiments/blob/main/EDRHookDetector.vba
- https://github.com/brimstone/go-shellcode
- https://github.com/sysdream/hershell
- https://github.com/yoda66/MalwareDevTalk
- https://labs.jumpsec.com/2019/06/20/bypassing-antivirus-with-golang-gopher-it/
- https://medium.com/@justen.walker/breaking-all-the-rules-using-go-to-call-windows-api-2cbfd8c79724
- https://posts.specterops.io/adventures-in-dynamic-evasion-1fe0bac57aa
- https://research.nccgroup.com/2021/01/23/rift-analysing-a-lazarus-shellcode-execution-method/
- https://www.ired.team/offensive-security/code-injection-process-injection/apc-queue-code-injection
- https://github.com/abdullah2993/go-runpe