CipherRun is a tool designed to automate common hacking techniques for ethical hacking and penetration testing purposes. This toolkit focuses on evading antivirus solutions through the use of heuristics bypasses, encryption, and different shellcode running techniques.
Connect with us! https://linktr.ee/hackerhermanos
-
CipherRun.cs: Contains the main program logic.
- Calls
heuristic.Sleep
to bypass behavioral detection. - Encrypts the payload located in
Shellcode.cs
usingCaesar.Encryption.Encrypt
. - Passes the encrypted payload to
Caesar.Injection.Inject
orCaesar.ProcessHollow.Hollow
(these are the shellcode runner files). - The runner file decrypts the payload using
Caesar.Encryption.Decrypt
and executes the instructions.
- Calls
-
Shellcode.cs: Contains the payload to be utilized. Paste your payload here.
-
Heuristics Folder (Heuristics Namespace):
- Sleep.cs: Implements a heuristic sleep function to bypass behavioral detections.
-
Caesar Folder (Caesar Namespace):
- Encryption.cs: Contains Caesar encryption and decryption routines.
- Injection.cs: Contains a shellcode running function which injects into
explorer.exe
. - ProcessHollow.cs: Contains a shellcode running function which performs process hollowing.
-
Clone the repository:
git clone https://github.com/Hacker-Hermanos/CipherRun.git
-
Add your shellcode into
Shellcode.cs
. Select your preferred shellcode runner inCipherRun.cs
-
Compile the project using Visual Studio.
-
Start your listener
-
Run the compiled executable on the victim machine.
Note: This tool is intended for educational and ethical hacking purposes only. Ensure that you have appropriate authorization before using it in any environment.
Contributions to enhance and expand the functionality of this toolkit are highly encouraged. If you have ideas for additional features, improvements, or bug fixes, please submit a pull request.
This toolkit is provided for educational and ethical hacking purposes only. The author is not responsible for any misuse or damage caused by the use of this software. Use it responsibly and with proper authorization.
This project was inspired by Apophis. We would like to extend our gratitude to the creators of Apophis for their innovative work, which served as a foundation and inspiration for this tool.
- Investigate how to make the experience more user friendly
- Add new heuristic bypasses and techniques
- Add new Shellcode Running techniques
- Add new encryption routines
- Add an aliases to select encryption+technique