• Stars
    star
    979
  • Rank 46,781 (Top 1.0 %)
  • Language
    Go
  • License
    MIT License
  • Created over 7 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Reflective PE packer.


Inroduction

Amber is a position-independent(reflective) PE loader that enables in-memory execution of native PE files(EXE, DLL, SYS...). It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products, and application white-listing mitigations. Reflective payloads generated by Amber can either be staged from a remote server or executed directly in memory much like a generic shellcode. By default, every generated payload is encoded using the new generation SGN encoder. Amber uses CRC32_API and IAT_API for inconspicuously resolving the Windows API function addresses. After the PE file is loaded and executed in memory, the reflective payload is erased for evading memory scanners.

Installation

Pre-compiled binaries can be found under releases.

Building From Source

The only dependency for building the source is the keystone engine, follow these instructions for installing the library. Once libkeystone is installed on the system, simply just go get it ツ

go install github.com/EgeBalci/amber@latest

Docker Install

Docker

docker pull egee/amber
docker run -it egee/amber

Usage

The following table lists switches supported by the amber.

Switch Type Description
-f,--file string Input PE file.
-o,--out string Output binary payload file name.
-e int Number of times to encode the generated reflective payload
--iat bool Use IAT API resolver block instead of CRC API resolver block
-l int Maximum number of bytes for obfuscation (default 5)
--sys bool Perform raw syscalls. (only x64)
--scrape bool Scrape magic byte and DOS stub from PE.

Example Usage

  • Generate reflective payload.
amber -f test.exe
  • Generate reflective payload with IAT API resolver and encode the final payload 10 times.
amber -e 10 --iat -f test.exe

Docker Usage

docker run -it -v /tmp/:/tmp/ amber -f /tmp/file.exe

Demo

More Repositories

1

sgn

Shikata ga nai (仕方がない) encoder ported into go with several improvements
Go
952
star
2

HERCULES

HERCULES is a special payload generator that can bypass antivirus softwares.
Go
592
star
3

EGESPLOIT

EGESPLOIT is a golang library for malware development
Go
329
star
4

deoptimizer

Evasion by machine code de-optimization.
Rust
327
star
5

ARCANUS

ARCANUS is a customized payload generator/handler.
Go
143
star
6

Cminer

Cminer is a tool for enumerating the code caves in PE files.
C++
131
star
7

Keylogger

Simple C++ Keylogger...
C++
128
star
8

WSAAcceptBackdoor

Winsock accept() Backdoor Implant.
C
111
star
9

Mass-Hacker-Arsenal

Massive arsenal of hacker tools...
Shell
75
star
10

Hook_API

Assembly block for hooking windows API functions.
Assembly
72
star
11

IAT_API

Assembly block for finding and calling the windows API functions inside import address table(IAT) of the running PE file.
Assembly
64
star
12

The-Eye

Simple security surveillance script for linux distributions.
Go
53
star
13

MapPE

PE file mapping and manipulation package.
Go
37
star
14

syscall_api

Assembly
36
star
15

Ticketbleed

This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.
Go
28
star
16

zippo

Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.
Go
26
star
17

SelfDefense

Several self-defense shellcodes
Assembly
22
star
18

MSF-Self-Defence

Self defense post module for metasploit
Ruby
18
star
19

meterpreter

Basic multi platform meterpreter loader module.
Go
17
star
20

MSF-Telegram-Notify

Telegram notification for metasploit sessions.
Ruby
15
star
21

BitBender

BitBender is a byte manipulation tool
Go
15
star
22

AzorultDecryptor

Brute-force script for finding azorult XOR key.
Go
15
star
23

crc32_api

Assembly API block that uses CRC32 for resolving Windows API function addresses
Assembly
14
star
24

KPOT-Decryptor

Tool for finding KPOT XOR key using known-plaintext attack.
Go
14
star
25

sub7

Clone of https://gitlab.com/illwill/sub7 repo.
Pascal
14
star
26

Injector

Simple shellcode injector.
C++
14
star
27

CryptAPI

Ransomware Using CryptoAPI
C
13
star
28

keystone-go

Keystone binding for golang
C
11
star
29

CVE-2022-29154

HIP2022 presentation materials.
10
star
30

urlscan-go

URLScan Go API client
Go
8
star
31

ARMBot_RCE

ARM Bot RCE Exploit.
Ruby
6
star
32

egebalci

6
star
33

CVE-2018-8065

Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit
Ruby
6
star
34

cracklord-docker

Experimental docker image for http://jmmcatee.github.io/cracklord/
Dockerfile
4
star
35

LG-Smart-IP-Device-Backup-Download

Exploit for downloading backup files from LG Smart IP Devices.
Python
4
star
36

Baldr_Exploit

Baldr remote code execution exploit for versions <= v3
Ruby
4
star
37

Sync_Breeze_Enterprise_10_6_24_-DOS

Sync Breeze Enterprise 10.6.24 - Denial Of Service Vulnerability
Ruby
2
star
38

AdvertisementBot

An advertisement bot for twitter.
JavaScript
2
star
39

conpty-go

Go
1
star
40

dotfiles

My dotfiles
1
star