Skip to content

Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection

License

Notifications You must be signed in to change notification settings

aniko33/AlcatrazLdr

Repository files navigation

AlcatrazLdr

An evasive shellcode loader with indirect syscalls, thread name-calling allocation, and PoolParty injection.

                    -- 
                   /--\                                                                 
                  /----\                                                                
                 |      |                                                               
                 |      |                                                               
                 |      |                                                               
                 |      |                                                               
                 |      |                                                               
                 |      |                                                               
                 |      |                                                               
                 |      |----------------------------------------------                 
                 |      /                                              \       #        
                 |     /                                                \    *#""       
                 |    /                                                  \     ##"      
                 |   |----------------------------------------------------|      #"     
                 |   |                                                    |       #"    
                 |   |  [||]   [||]   [||]   [||]   [||]   [||]   [||]    |       **"   
                 |   |                                                    |             
                 |   |  [||]   [||]   [||]   [||]   [||]   [||]   [||]    |   < EVADE! >
                 |   |   _____ _         _               __      _        |  /          
             @   |   |  |  _  | |___ ___| |_ ___ ___ ___|  |   _| |___    | --    @@$   
            @    ++++|  |     | |  _| .'|  _|  _| .'|- _|  |__| . |  _|   |╹_╹ )  @     
            @       +|  |__|__|_|___|__,|_| |_| |__,|___|_____|___|_|     |⊂ノ    @@     
            @        |                                                    |     @@      
            @@       ------------------------------------------------------   @@        
             @@                                                             @@@         
              @@                                                          @@@           
               @@                                                     @@@@              
                 @@                                            @ @@@@@                  
                   @@@@       @@ @@@@@@@@@@@@    @@   @@@@@@@@@                         
                      @@@@@@@@@@@@@@      @@@@@@@@@@@@@

Table of Contents


Features

  • AV/EDR Evasion: Utilizes shellcode encoding and indirect syscalls through the Hell's Gate technique.
  • Remote Process Injection: Inject shellcode into remote processes via the Thread name-calling method.
  • Shellcode Execution: Executes shellcode via the PoolParty technique (Direct I/O).

Installation

  1. Clone the repository:

    git clone https://github.com/aniko33/AlcatrazLdr.git --recurse-submodules
    cd AlcatrazLdr
  2. Run the AlcatrazLdr builder (ensure Python 3 is installed):

    python alcatrazLdr.py --help

Usage

usage: AlcatrazLdr [-h] [--target-process TARGET_PROCESS] [--quiet] [--debug]
                   [--docker]
                   file

Evasive shellcode loader with indirect syscalls, Thread name-calling
allocation, PoolParty injection

positional arguments:
  file                  File to embed into the loader

options:
  -h, --help            show this help message and exit
  --target-process, -tp TARGET_PROCESS
                        Target process name to inject
  --quiet, -q           No banner
  --debug, -d           Debug flag
  --docker, -dk         Docker flag

To create a new executable:

python alcatrazLdr.py <path_to_shellcode.bin>

To create a new executable with custom target process (default: notepad.exe):

python alcatrazLdr.py <path_to_shellcode.bin> --target-process <target.exe>

To create a new executable with Docker support:

python alcatrazLdr.py <path_to_shellcode.bin> --docker

To create a new executable with the debug flag enabled:

python alcatrazLdr.py <path_to_shellcode.bin> --debug

To suppress the banner output:

python alcatrazLdr.py <path_to_shellcode.bin> --quiet

Notes

  • The shellcode size is limited to 65532 bytes due to the RtlInitUnicodeStringEx function.

About

Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published