Build
The image bellow is a GUI for build agent

Compilation Format
Exe: Puts the shellcode in the.text and calls it via pointer
Dll: Puts the shellcode in .text calls it via pointer, to execute it needs to call the exported function called Runner
Svc: Service binario that puts shellcode in .text calls it via pointer
Bin: Raw Shellcode
Sleep / Jitter
Sleep time for Agent Callback and Jitter in percentage for randomization
Guardrails
Execution control, IpAddress, Hostname, Username and Domain can be used. The beacon will only run if it is in an environment with these settings
Killdate
Setting a date to stop execution, allowing you to change the exit method (process/thread) and self-deletion.
Worktime
Time range in which the beacon can perform a callback.
Fork Named Pipe
Name of the pipe used for fork&run routines.
Spawn to
Sacrificial process used to execute fork&run routines.
Bypass
AMSI/ETW bypass configuration for dotnet routines using the post-ex arsenal dotnet command.
Shellcode Injection
Used in post-ex fork&run routines and the scinject command, current options are module stomping and standard injection.
Syscall and BOF API Proxy
Configuration to choose whether specific APIs will be Spoof+Indirect, and BOF API Proxy will use these functions by proxying BOF functions to Spoof+Indirect.
Sleep Mask + Heap Obf
The technique used for beacon obfuscation in memory, Heap Obf, is for obfuscating heap allocations made by the beacon during sleep.
Last updated