Skip to content

oxagast/malRoller

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Usage

  • Clone the git repo.
  • Choose a decoy program, has to be .exe format.
  • Copy the decoy program's .exe into the repo dir and rename it decoy.exe.
  • Pick a payload, such as the rev_shell, and copy it to the repo root, renaming it payload.py.
  • Edit the src of the payload.py to reflect the host and port you want to connect back to.
  • Run the build_script.bat file.
  • Now should appear a new directory named .\repacked\ with a .exe file in it (repacked.exe).
  • The file will be about 13mb to 15mb in size, plus however large the decoy.exe is.
  • Locally run nc -l -p [port] -v (if using rev_shell).
  • Social engineer your victim into running the executable in the repacked dir.
  • Wait for shell!

Enjoy!

Disclaimer

Please don't do stupid shit and get busted using this. This is for research purposes only. I am not liable for your actions!

Authors

Marshall Whittaker - [email protected]

About

Malware rolled into legit installers with Python

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published