Tengri Shellcode Loader is a Cobalt Strike and x86 shellcode Loader builder for use on Red Team and Adversary Simulation engagements.
- Generate a loader from either DNS or HTTPS shellcode
- Generate a loader that checks HTTPS connectivity and based on reponse either injects HTTPS or DNS shellcode into memory
- Add Registry Entry to run loader on Start Up
- AV Bypass - i've currently only test it with Symantec and one or two others, this needs further validation.
- Generate a loader that checks both HTTPS and DNS connectivity and if both fails runs an SMTP agent
- Generate an InstallUtil Function to evade application whitelisting
- Add Sandbox detection techniques
- Port to earlier versions of the .NET framework
For this the current way that i have found it to work, is making a text file with some text in side (can be anything), hosting it on the Teamserver (Attacks -> Web Drive-By -> Host File) and to then enter https://redirectordomain/textfile into the connectivity check for the beacon when generating the loader.
This will ensure that it reaches out to HTTPS teamserver if it is reachable
The loader and loader generator require .NET framework v4 to be installed on both the generator's and victim's machine.
You can download .NET framework v4 from here
It is a GUI application and fairly self explanatory. To run is just run the Tengri_SB.exe in the same folder as the rest of the repo.
The folder structure MUST be maintained for it to work and generated loaders are output into the FinishedLoader folder.
You will need to feed it either Metasploit and Cobalt Strike raw (.bin) x86 shellcode.
The GUI looks like this: