Amber is a proof of concept packer for bypassing security products and mitigations. It can pack regularly compiled PE files into reflective payloads that can load and execute itself like a shellcode. It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products and application white-listing mitigations. If you want to learn more about the packing methodology used inside Amber check out below. For more detail about usage, installation and how to decrease detection rate check out WIKI.
Developed By Ege Balcı from INVICTUS/PRODAFT.
SUPPORTED PLATFORMS:
Operating system | Tested Version |
---|---|
Ubuntu | 16.04\16.10\17.04\17.08 |
Kali linux | 2017.1\2018.1 |
BlackArch | * |
Arch Linux | * |
Manjaro | * |
Debian | 9.2 |
BLACKARCH INSTALL
sudo pacman -S amber
DOCKER INSTALL
docker pull egee/amber
docker run -it egee/amber
BUILD FROM SOURCE
For compiling from source running the setup file will be enough.
git clone https://github.com/egebalci/Amber.git
cd Amber/setup/
./setup.sh
USAGE:
amber [options] file.exe
OPTIONS:
-k, -keysize Size of the encryption key in bytes (Max:255/Min:8)
-r, -reflective Generated a reflective payload
-i, -iat Uses import address table entries instead of export address table
-s, -scrape Scrape the PE header info (May break some files)
-no-resource Don't add any resource data
-ignore-integrity Ignore integrity check errors
-v, -verbose Verbose output mode
-h, -H Show this massage
EXAMPLE:
(Default settings if no option parameter passed)
amber -k 8 file.exe
On Docker
docker run -it -v /tmp/:/tmp/ amber /tmp/file.exe
- NOPcon 2018 DEMO