Update configs

patch-1
chamilton 2016-11-11 14:35:45 -05:00
commit 97787753e3
2 changed files with 18 additions and 17 deletions

View File

@ -1,7 +1,6 @@
## MaliciousMacroGenerator
#Malicious Macro Generator Utility
Simple utility design to generate obfuscated macro that also include a AV / Sandbox escape trick
Simple utility design to generate obfuscated macro that also include a AV / Sandboxes escape mechanism.
#Requirement
```
@ -11,12 +10,15 @@ Python 3.4 (Not supported yet)
#Usage
```
Usage: GenMacro.py [config] [output]
MMG.Malicious Macro Generator v2.0 - RingZer0 Team
Author: Mr.Un1k0d3r mr.un1k0d3r@gmail.com
Usage: MMG.py [config] [output]
config Config file that contain generator information
output Output filename for the macro
python GenMacro.py configs/generic-cmd-domain-evasion.json malicious.vba
python MMG.py configs/genric-cmd.json malicious.vba
```
#Config file

View File

@ -1,13 +1,12 @@
{
"description": "Generic command exec payload\nEvasion technique set to none",
"template": "templates/payloads/generic-cmd-template.vba",
"varcount": 150,
"encodingoffset": 4,
"chunksize": 200,
"encodedvars": {},
"vars": [],
"evasion": [
"encoder"
],
"payload": "cmd.exe /c echo pwn > C:\\work.txt"
}
{
"description": "Generic command exec payload\nEvasion technique set to none",
"template": "templates/payloads/generic-cmd-template.vba",
"varcount": 150,
"encodingoffset": 4,
"chunksize": 200,
"encodedvars": {},
"vars": [],
"evasion": ["encoder"],
"payload": "cmd.exe /c whoami"
}