Skip to content

NtDallas/Svartalfheim

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Svartalfheim

Stage 0 Shellcode to Download a Remote Payload and Execute it in Memory

The Nt API calls NtAllocateVirtualMemory and NtProtectVirtualMemory are made using indirect syscalls.

LoadLibraryA and WinHTTP calls are performed with return address spoofing.

When the shellcode is executed in a spoofed thread, the stage 0 self-deletes from memory.

Usage

Option Description Required Default Value
-e Http endpoint Yes
-u Http uri Yes
-p Http port Yes
-a User agent No Mozilla/5.0 (Windows NT 10.0; Win64; x64)
-s Use TLS No Empty
-v View shellcode at C format No Empty

Example :

  • python3 builder.py -u 10.10.100.121 -u /path/to/shellcode.bin -p 80
  • python3 builder.py -u 10.10.100.121 -u /path/to/shellcode.bin -p 443 -s
  • python3 builder.py -u 10.10.100.121 -u /path/to/shellcode.bin -p 8080 -v

Credit

About

Stage 0

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published