uid0000 / Amber

Reflective PE packer.

Home Page:https://pentest.blog

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Banner

Version License Go Report Card Twitter

amber is a reflective PE packer for bypassing security products and mitigations. It can pack regularly compiled PE files into reflective payloads that can load and execute itself like a shellcode. It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products and application white-listing mitigations. If you want to learn more about the packing methodology used inside amber check out below. For more detail about usage, installation and how to decrease detection rate check out WIKI.

Developed By Ege Balcı from INVICTUS/PRODAFT.

REFLECTIVE PE PACKING WITH AMBER


DEMO1









INSTALLATION

DEPENDENCIES

On *nix systems both of the dependencies can be installed with OS packet managers. (APT/PACMAN/YUM)

Get one of the pre-build release here. Or get it with following alternatives.

GO (suggested)

go get github.com/egebalci/amber

BLACKARCH INSTALL

sudo pacman -S amber

DOCKER INSTALL

Docker

docker pull egee/amber
docker run -it egee/amber

USAGE

USAGE: 
  amber [options] file.exe
OPTIONS:
  -k, -keysize                Size of the encryption key in bytes (Max:255/Min:8)
  -r, -reflective             Generated a reflective payload
  -a, -anti-analysis          Add anti-analysis measures
  -i, -iat                    Use import address table entries instead of export address table
  -s, -scrape                 Scrape the PE header info (May break some files)
  -no-resource                Don't add any resource data (removes icon)
  -ignore-integrity           Ignore integrity check errors
  -v, -verbose                Verbose output mode
  -h, -H                      Show this massage
EXAMPLE:
  (Default settings if no option parameter passed)
  amber -k 8 file.exe

Docker Usage

docker run -it -v /tmp/:/tmp/ amber /tmp/file.exe

EXAMPLE USAGE



DEMO1 DEMO1



About

Reflective PE packer.

https://pentest.blog

License:MIT License


Languages

Language:Assembly 58.0%Language:Go 41.1%Language:YARA 0.6%Language:Dockerfile 0.3%