Skip to content

Dosglas/Amber

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Banner

Version License Golang Twitter

Amber is a proof of concept packer for stealthy payload deployment and anti-virus evasion purposes, it can pack regularly compiled PE files into reflective PE files that can be used as multi stage infection payloads. If you want to learn the packing methodology used inside the Amber check out below. For more detail about usage, installation and how to decrease detection rate check out WIKI.

Developed By Ege Balcı from INVICTUS/PRODAFT.

REFLECTIVE PE PACKING WITH AMBER


DEMO1









INSTALLATION

SUPPORTED PLATFORMS:

Operating system Tested Version
Ubuntu 16.04\16.10\17.04\17.08
Kali linux 2018.1\2017.1
Manjaro *
Arch Linux *
Black Arch *
Debian 9.2

BUILD

For compiling from source running the setup file will be enough.

	./setup.sh

DOCKER

	docker pull egee/amber
	docker run -it egee/amber

USAGE

	USAGE: 
	  amber [options] file.exe
	OPTIONS:
	  
	  -k, --key       [string]        Custom cipher key
	  -ks,--keysize   <length>        Size of the encryption key in bytes (Max:255/Min:8)
	  --staged                        Generated a staged payload
	  --iat                           Uses import address table entries instead of export address table
	  --no-resource                   Don't add any resource
	  -v, --verbose                   Verbose output mode
	  -h, --help                      Show this massage

	EXAMPLE:
	  (Default settings if no option parameter passed)
	  amber -ks 8 file.exe

On Docker
docker run -it -v /tmp/:/tmp/ amber /tmp/file.exe

EXAMPLE USAGE


DEMO1 DEMO1


About

Reflective PE packer.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 72.5%
  • Assembly 24.0%
  • Shell 2.3%
  • Other 1.2%