Skip to content

CoreyCBurton/DripLoaderNG

Repository files navigation

Introduction

DripLoaderNG is based on the project "DripLoader", which was created by xuanxuan0. This variant has the evasion features such as .node sideloading and indirect syscalls.

This project was developed for my blog "DripLoader: A Case Study on Shellcode Execution & Evasion"

Capability

DripLoaderNG can only be used on Windows (10/11) hosts.

DripLoaderNG by default is currently configured for the Slack .node file "keymapping.node"

In development testing, HTTPS payloads were the most evasive.

Usage

  1. Generate a .bin file with the desired shellcode.
  2. Run the script lzms_compress.py. (Keep this file within the project folder, shellcode.h will generate)
    • Usage: python3 lzms_compress.py path/to/.bin
  3. Rename the original keymapping.node file to nativebindings.node.
  4. Drop the payload compiled from this project in the same folder.
  5. Run the application.

Guidance

Reference to configuring DripLoaderNG to other .node files

References

About

Next Generation of DripLoader with Indirect Syscalls and .node Side-loading

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published