Skip to content

Commit 5718ae3

Browse files
author
root
committed
update V1.8
1 parent a5186ea commit 5718ae3

File tree

16 files changed

+210
-58
lines changed

16 files changed

+210
-58
lines changed

.idea/workspace.xml

Lines changed: 96 additions & 48 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

BypassFramework.py

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@
33
from core.functions import *
44
import readline
55
from module.memory.CreateFiber import *
6+
from module.UUID.UUID_bypass import *
67
from module.memory.QueueUserAPC import *
78
from module.Separation.imageShell import *
89
from module.darkexe.darkexe import *
@@ -122,6 +123,29 @@
122123
break
123124
except EOFError:
124125
print(" ")
126+
if exe_command.strip(" ")[0] == "4":
127+
while True:
128+
try:
129+
bypass4_command = input("\033[4mFourEye(shellcode_bypass4)\033[0m" + colored(" >>", "green"))
130+
if bypass4_command == "UUID":
131+
UUIDSehllcode()
132+
if bypass4_command == "x86":
133+
flag = 1
134+
if bypass4_command == "x64":
135+
flag = 2
136+
if bypass4_command == "execute":
137+
if flag == 1:
138+
x86_uuid_execute()
139+
elif flag == 2:
140+
x64_uuid_execute()
141+
if bypass4_command == "exit":
142+
sys.exit()
143+
if bypass4_command == "back":
144+
break
145+
146+
except EOFError:
147+
print(" ")
148+
125149

126150
except EOFError:
127151
print(" ")

README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
\|
1313
1414
15-
v1.7 stable !
15+
v1.8 stable !
1616
author lengyi@HongHuSec Lab !
1717
1818
FourEye BypassFrameWork | BypassAV your shellcode && exe
@@ -88,6 +88,8 @@ https://www.bilibili.com/video/BV1b54y1x7RT
8888

8989
2021.01.09: 隐藏窗口
9090

91+
2021.01.26: 增加UUID免杀方法
92+
9193

9294
## TODO
9395

623 Bytes
Binary file not shown.

core/functions.py

Lines changed: 19 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ def bypass_list():
3232
print(colored("[+] BypassAV1:Shellcode Launcher using Fibers", "red"))
3333
print(colored("[+] BypassAV2:Shellcode Launcher using QueueUserAPC", "red"))
3434
print(colored("[+] BypassAV3:Shellcode Launcher using PNG", "red"))
35+
print(colored("[+] BypassAV4:Shellcode Launcher using UUID", "red"))
3536

3637
def help():
3738
print(colored("Available commands to use :\n","cyan"))
@@ -60,7 +61,7 @@ def x86cpp_execute():
6061
def x64c_execute():
6162
try:
6263
os.system('x86_64-w64-mingw32-gcc ' + '/root/shellcode.c' + ' -o ' + '/root/shellcode.exe' + " --static" + " -w")
63-
os.system('rm -rf '+ '/root/shellcode.c')
64+
#os.system('rm -rf '+ '/root/shellcode.c')
6465
print(colored("[+]shellcode compoile at /root/shellcode.exe\n","cyan"))
6566
except:
6667
print(colored("[-]error\n","cyan"))
@@ -73,9 +74,24 @@ def x86c_execute():
7374
except:
7475
print(colored("[-]error\n","cyan"))
7576

77+
def x86_uuid_execute():
78+
try:
79+
os.system('x86_64-w64-mingw32-gcc ' + '-m32 ' + '/root/shellcode.c' + ' -o ' + '/root/shellcode.exe' + " --static" + " -w" + " -lrpcrt4")
80+
os.system('rm -rf '+ '/root/shellcode.c')
81+
print(colored("[+]shellcode compoile at /root/shellcode.exe\n","cyan"))
82+
except:
83+
print(colored("[-]error\n","cyan"))
84+
85+
def x64_uuid_execute():
86+
try:
87+
os.system('x86_64-w64-mingw32-gcc ' + '/root/shellcode.c' + ' -o ' + '/root/shellcode.exe' + " -lrpcrt4" + " --static" + " -w")
88+
os.system('rm -rf '+ '/root/shellcode.c')
89+
print(colored("[+]shellcode compoile at /root/shellcode.exe\n","cyan"))
90+
except:
91+
print(colored("[-]error\n","cyan"))
7692

7793
def banner():
78-
version = '\33[43m V1.0 Beta \033[0m'
94+
version = '\33[43m V1.8 Beta \033[0m'
7995
Yellow = '\33[33m'
8096
OKGREEN = '\033[92m'
8197
CRED = '\033[91m'
@@ -92,7 +108,7 @@ def banner():
92108
\|
93109
{1}
94110
95-
{3}v1.7 stable !{1}
111+
{3}v1.8 stable !{1}
96112
{3}author lengyi@HongHuSec Lab !{1}
97113
98114
{2} FourEye BypassFrameWork | BypassAV your shellcode && exe {1}
0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)