Skip to content

Simple generator of Go DLL shellcode loader, with shellcode obfuscated using Babble.

Notifications You must be signed in to change notification settings

ineffectivecoder/johnny_dllaze

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

31 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Johnny DLLaze, GOst Writer

This tool was developed for red team or other security testing purposes. It will simply take a shellcode (e.g., .bin) file, obfuscate the shellcode using Babble, and then build a DLL (written in Go) that decodes the shellcode (in place, in memory) and executes it using VirtualAlloc/RtlCopyMemory/VirtualProtect/CreateThread. The DLL is also built with customizable Windows Version Info to make it appear more like a "real" DLL.

Prerequisites

go
mingw-w64-gcc

Usage

This tool was designed to be used in Linux.

First, edit the versioninfo.json file in the goDLL directory, if desired. You will also probably want to change the name of the output DLL in goDLL/build_dll_on_linux.sh. (The default name is updater.dll)

Then, from the root directory of the repository, run:

./generate_payload.sh /path/to/your/payload.bin

The generated DLL file, updater.dll by default, will be in the goDLL directory.

Once it's built, it can be executed with regsvr32, rundll32 (Main, DllRegisterServer, and DllUnRegisterServer are all exported), or sideload.

Credit

These great libraries were used in the code:

...and I shamelessly copied code from these sources:

About

Simple generator of Go DLL shellcode loader, with shellcode obfuscated using Babble.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 97.4%
  • Go 2.6%