Files
Abdallah Elsharif 2e9efe2aed Update README.md
2023-03-17 22:48:56 -04:00

59 lines
1.6 KiB
Markdown

# hellMaker
hellMaker is a tool for generating fully undetectable malwares for any C&C tool you want, it uses several evasion techniques.
## Features
- shellcode encryption using xor method
- shellcode UUID Obfuscation
- IAT Hiding & Obfuscation
- Bypass memory monitoring
- Evade behavior analysis and sandbox using several techniques
- Obfuscate all static stuff using random key
- Anti Debugging
- Process UnHooking
- Get ntdll base address without using GetModuleHandle/LoadLibrary
- No new thread execution
- Both x64\x86 are supported
- Support stageless payloads
## Note
You must run payloads from cmd.exe or powershell.exe.
## Installation
- Git clone this repo
- Change dir into the folder
- The tool doesn't require any dependencies
- Run `python3 hellMaker.py`
## Usage
First, you need to create a raw shellcode using the C2 tool you prefer,\
then run the tool and enter the shellcode and Encryption key and the output filename.
```
┌──(user㉿hostname)-[~/path/to/hellMaker]
└─$ python3 hellMaker.py
_ _ _ __ __ _
| |__ ___| | | \/ | __ _| | _____ _ __
| '_ \ / _ \ | | |\/| |/ _` | |/ / _ \ '__|
| | | | __/ | | | | | (_| | < __/ |
|_| |_|\___|_|_|_| |_|\__,_|_|\_\___|_|
Author -> Abdallah Mohamed
Usage:
./hellMaker.py <path/to/shellcode.bin> <EncryptionKey> <Output.c>
```
## Run
![](imgs/Run.png)
## Test
![](imgs/FUD.png)
## Compile
`cl <payload>.c` using visual studio
## Warning
I am not responsible for any of your actions, this tool for educational purposes only.