Skip to content

kapellos/VladimiRED

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

VladimiRED

VladimiRED (you expect to get one thing and you end up with something else 😆) is a C# port of Mockingjay injection technique (https://github.com/caueb/Mockingjay) to be used with AppDomainManager Injection Method.

The produced dll injects shellcode into already existing RWX regions via Marshaling avoiding using pinvoke related injection calls.

image

Usage

You will need a 64bit AppDomainManager Microsoft Signed application to run this (unless you revert this to a standard console application).

I suggest the excellent resources by Mr. Mr-Un1k0d3r:

1)https://github.com/Mr-Un1k0d3r/.NetConfigLoader

2)https://raw.githubusercontent.com/Mr-Un1k0d3r/.NetConfigLoader/main/signed.txt

Also you will need some other "vulnerable" dll since the original, which is also used in this project, has limited shellcode space for a CS beacon. You can find them using the python script (https://github.com/caueb/Mockingjay) in everyday workstations 😏.

Most importantly you will need a solid shellcode encryption/download method which I do not provide here if you really need to evade EDRs.

Credits

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages