DripLoaderNG is based on the project "DripLoader", which was created by xuanxuan0. This variant has the evasion features such as .node sideloading and indirect syscalls.
This project was developed for my blog "DripLoader: A Case Study on Shellcode Execution & Evasion"
DripLoaderNG can only be used on Windows (10/11) hosts.
DripLoaderNG by default is currently configured for the Slack .node file "keymapping.node"
In development testing, HTTPS payloads were the most evasive.
- Generate a .bin file with the desired shellcode.
- Run the script lzms_compress.py. (Keep this file within the project folder, shellcode.h will generate)
- Usage:
python3 lzms_compress.py path/to/.bin
- Usage:
- Rename the original keymapping.node file to nativebindings.node.
- Drop the payload compiled from this project in the same folder.
- Run the application.