Bazzy is a tool designed to inject shellcode into Windows processes or execute it directly. It can target either the explorer.exe process by default, inject into a newly spawned process in a suspended state, or execute shellcode directly without process injection.
- Multiple execution modes:
- Direct shellcode execution
- Process injection with remote thread creation
- Suspended process creation and injection
- Command-line interface with multiple options:
- Custom base64 encoded shellcode payload
- Default injection into explorer.exe
- Direct shellcode execution
- Process creation in suspended state for safer injection
- Nim: Nim Programming Language
- Winim Library: Provides Nim bindings for the Windows API. Install it using:
nimble install winim
- Clone the Repository:
git clone https://github.com/jeffaf/bazzy.git cd bazzy - Install Dependencies:
Ensure you have the
winimpackage installed:nimble install winim
- Build the Project:
nim c -r bazzy.nim
Bazzy can be used in several ways:
# Show help and available options
bazzy -h
# Use default payload and inject into explorer.exe
bazzy
# Use custom payload and inject into explorer.exe
bazzy -p "your_base64_payload"
# Use custom payload and inject into specific process
bazzy -p "your_base64_payload" -t "notepad.exe"
# Execute shellcode directly without process injection
bazzy -p "your_base64_payload" -e
# Use default payload but inject into newly spawned process
bazzy -t "notepad.exe"- Direct Execution (-e): Executes the shellcode directly in the current process
- Targeted Injection (-t): Creates a suspended process and injects the shellcode
- Default Injection: Injects into explorer.exe if no other mode is specified
-h, --help: Show help information-p, --payload <base64>: Specify base64 encoded shellcode payload-t, --target <process>: Specify target process name (default: explorer.exe)- -e, --execute: Execute shellcode directly without process injection
This project is intended solely for educational and research purposes.
Feel free to open issues and submit pull requests if you'd like to contribute.
Inspired by the following projects:
- https://github.com/sh3d0ww01f/nim_shellloader/
- https://github.com/byt3bl33d3r/OffensiveNim
- https://maldevacademy.com