timwhitez starred koneko
这篇文章介绍了一个Cobalt Strike shellcode加载器,具备多种高级规避技术,如自定义睡眠实现、内联挂钩、纤维线程切换、返回地址欺骗等,能够绕过Palo Alto Cortex xDR、微软 Defender 等安全软件。同时支持反虚拟机和反调试检测,并通过EncodePointer隐藏shellcode。但其局限性在于不适用于UDRL加载器,且仅限于当前执行环境。 2025-4-24 03:26:19 Author: github.com(查看原文) 阅读量:10 收藏

Repository files navigation

A Cobalt Strike shellcode loader with multiple advanced evasion features.

1739210063119

Disclaimer

Don't be evil with this. I created this tool to learn. I'm not responsible if the Feds knock on your door.


Historically was able to (and may still) bypass

  • Palo Alto Cortex xDR
  • Microsoft Defender for Endpoints
  • Windows Defender
  • Malwarebytes Anti-Malware

cortex

Features

  • Fully custom sleep implementation with thread callstack spoofing using NtCreateEvent and NtWaitForSingleObject
  • Inline hook on Sleep/SleepEx to redirect to said custom sleep implementation
  • Switching between Fiber threads to further avoid memory scanning
  • Return address spoofing on (almost?) every other API/NTAPI call
  • All the indirect syscalls!
  • Bunch of anti-VM and anti-debugger checks
  • Splitting and hiding shellcode as a bunch of x64 addresses with the EncodePointer API
  • Probably other stuff I forgot to mention here

Negatives

  • It's not a UDRL loader, these spoof tricks are limited to only the running executable and will go away when you process inject to something else.
  • The sleep obfuscation is tailored to Cobalt Strike. To work with other C2s you'd need to tailor how the hooking happens. Use a tool like apimonitor to intercept API calls from your beacon, detect the API(s) called on the sleep cycle, and then adjust the hooks as needed.

文章来源: https://github.com/Meowmycks/koneko
如有侵权请联系:admin#unsafe.sh