All Projects → tanc7 → dark-lord-obama

tanc7 / dark-lord-obama

Licence: other
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to dark-lord-obama

disctopia-c2
Windows Remote Administration Tool that uses Discord as C2
Stars: ✭ 216 (+254.1%)
Mutual labels:  rat, c2, command-and-control
link
link is a command and control framework written in rust
Stars: ✭ 345 (+465.57%)
Mutual labels:  penetration-testing, c2, command-and-control
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+5672.13%)
Mutual labels:  penetration-testing, oscp, oscp-tools
OSCP-A-Step-Forward
Opening the door, one reverse shell at a time
Stars: ✭ 126 (+106.56%)
Mutual labels:  penetration-testing, oscp
maalik
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+22.95%)
Mutual labels:  penetration-testing, rat
oscp-omnibus
A collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-24.59%)
Mutual labels:  penetration-testing, oscp
Javascript Obfuscator
A powerful obfuscator for JavaScript and Node.js
Stars: ✭ 8,204 (+13349.18%)
Mutual labels:  encoding, obfuscation
Pentest-Service-Enumeration
Suggests programs to run against services found during the enumeration phase of a Pentest
Stars: ✭ 80 (+31.15%)
Mutual labels:  oscp, oscp-tools
c2
A simple, extensible C&C beaconing system.
Stars: ✭ 93 (+52.46%)
Mutual labels:  penetration-testing, command-and-control
pentesting-notes
Notes from OSCP, CTF, security adventures, etc...
Stars: ✭ 38 (-37.7%)
Mutual labels:  penetration-testing, oscp
ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-55.74%)
Mutual labels:  penetration-testing, oscp
OSCP-BoF
This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.
Stars: ✭ 53 (-13.11%)
Mutual labels:  oscp, oscp-tools
shellback
Reverse shell generator
Stars: ✭ 22 (-63.93%)
Mutual labels:  oscp, oscp-tools
Armor
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (+273.77%)
Mutual labels:  encoding, penetration-testing
venus
A Visual Studio Code Extension agent for Mythic C2
Stars: ✭ 47 (-22.95%)
Mutual labels:  c2, command-and-control
Bifrost
Bifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-39.34%)
Mutual labels:  c2, command-and-control
chkdfront
Check Domain Fronting (chkdfront) - It checks if your domain fronting is working
Stars: ✭ 42 (-31.15%)
Mutual labels:  c2, command-and-control
Discord-AIO
Discord AIO (All In One) - discord stealer/token grabber builder with token checks, webhook spammer, obfuscation, encryption, crypto miner, RAT and a lot of extra features.
Stars: ✭ 105 (+72.13%)
Mutual labels:  obfuscation, rat
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (+226.23%)
Mutual labels:  penetration-testing, oscp
Serpentine
C++/Win32/Boost Windows RAT (Remote Administration Tool) with a multiplatform Java/Spring RESTful C2 server and Go, C++/Qt5 frontends
Stars: ✭ 216 (+254.1%)
Mutual labels:  penetration-testing, rat

Dark Lord Obama will now be transitioned into Google Golang

The Python 2 to 3 transition was a clusterfuck, a atomic blast of breakage. https://lwn.net/Articles/843660/

It pisses me off, because my code worked PERFECTLY. But now PyPi won't properly install dependencies required for this to work. Even manually installing PyCrypto will through errors https://pypi.org/project/pycrypto/#files.

And I am not a big fan of half-assed hacks to fix things that should have been supported via some sort of compatibility.

Everyone, please move on along to the successor of DarkLordObama, EXOCET-Antivirus-Evasion. https://github.com/tanc7/EXOCET-AV-Evasion

Python is not IMO a programming language. It's a scripting language because it runs through a interpreter built primarily on C and various other languages.

Golang on the other hand, can be cross-compiled across multiple platforms with minimum modifications from a single codebase, usually for compatibility issues with the target operating system. But the point is, Golang WORKS.

I am planning to add inline assembly execution via Golang, which is considered impossible, but watch me do it. I will do it!

Dark Lord Obama - Undetectable Pythonic Payload Generator

Chang Tan Lister Lister Unlimited Cybersecurity Solutions, LLC. [email protected]

DLO generates a Pythonic reverse shell that as of July 29th, 2019, is undetectable on VirusTotal. It combines multiple won't-to-be-disclosed techniques (undiscloseable in detail) including but not limited to:

  1. "Command Segmentation"
  2. "AES Encryption" with a 32-bit key and a 16-bit initialization vector
  3. Base64 Encoding - It was a necessity
  4. Inline Python exec() functions, C asm() functions (will be added soon), Java/Jython, Cython, Ctypes

Dark Lord Obama Official Release Demo

Please click this link for a demostration video of how to use

Demo Video

Suggested Uses

Currently you can, after you gain a foothold in organization

  1. Run the payload standalone.
  2. Replace the proof-of-concept code with a Metasploit python payload
  3. Taint/corrupt Python repositories: Locate the Python code repositories of a organization during a pentest and then copy-paste the entire code and append it to the bottom of the python module, guarantee auto-execution of the reverse shell when the code runs
  4. Use the payload as a stager to download additional payloads
  5. Use the payload against MacOS (MacBooks, iMacs, etc). They natively run Python 2.7.1

Run it as python darklordobama.py <attacker IP> <attacker listening port>

How does it work?

First it chops up your payload into two-character segments, "Command Segmentation)

A ArrayMap is produced to allow the payload to reconstitute itself

The payload is then shuffled into a list array and then encrypted with AES-128

The encrypted payload is encoded in Base64 format

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].