Skip to content

A shellcode injection tool capable of bypassing AMSI. Features the QueueUserAPC() injection technique and supports XOR encryption

Notifications You must be signed in to change notification settings

lleon1435/Mshikaki

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Mshikaki

"Mshikaki - kebab (skewered meat, especially beef)" yum yum 😋

Overview

Mshikaki is a shellcode injection tool designed to bypass AMSI (Antimalware Scan Interface). It leverages the QueueUserAPC() injection technique and offers support for XOR encryption, making it a powerful tool for security researchers and penetration testers.

Table of Contents

Features

  • Bypass AMSI: Mshikaki is capable of bypassing the Antimalware Scan Interface, allowing for stealthy shellcode execution.
  • QueueUserAPC() Injection: This technique is used to inject shellcode into a running process, providing a method to execute arbitrary code.
  • XOR Encryption Support: Enhance the stealthiness of your shellcode by encrypting it with XOR, making detection even more challenging.

Installation

  1. Clone the repository:
git clone https://github.com/trevorsaudi/Mshikaki.git
  1. Compile the cpp source code:
g++ Mshikaki.cpp -o Mshikaki

Usage

  • Prepare your shellcode and, if desired, encrypt it using XOR.
  • The shellcode file should contain hex formatted shellcode as shown below.

msfvenom

  • Execute the tool with the necessary arguments:
Mshikaki.exe -i <path_to_shellcode> 
Mshikaki.exe -i <path_to_shellcode> -p <process_name>

demo

  • Example with encrypted shellcode

encrypted

Technical Details

  • Language: The tool is written in C++.
  • Injection Technique: Mshikaki uses the QueueUserAPC() function, a native Windows API, for shellcode injection.
  • Encryption: The tool supports XOR encryption to obfuscate the shellcode, making it harder for antimalware solutions to detect.

Contribution

  • Contributions to the Mshikaki project are welcome! If you have improvements, bug fixes, or new features to suggest, please create a pull request or open an issue on the GitHub repository.

About

A shellcode injection tool capable of bypassing AMSI. Features the QueueUserAPC() injection technique and supports XOR encryption

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C++ 100.0%