Skip to content

jeffaf/bazzy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Bazzy

Bazzy is a tool designed to inject shellcode into Windows processes or execute it directly. It can target either the explorer.exe process by default, inject into a newly spawned process in a suspended state, or execute shellcode directly without process injection.

Features

  • Multiple execution modes:
    • Direct shellcode execution
    • Process injection with remote thread creation
    • Suspended process creation and injection
  • Command-line interface with multiple options:
    • Custom base64 encoded shellcode payload
    • Default injection into explorer.exe
    • Direct shellcode execution
  • Process creation in suspended state for safer injection

Requirements

  • Nim: Nim Programming Language
  • Winim Library: Provides Nim bindings for the Windows API. Install it using:
    nimble install winim

Installation

  1. Clone the Repository:
    git clone https://github.com/jeffaf/bazzy.git
    cd bazzy
  2. Install Dependencies: Ensure you have the winim package installed:
    nimble install winim
  3. Build the Project:
    nim c -r bazzy.nim

Usage

Bazzy can be used in several ways:

# Show help and available options
bazzy -h

# Use default payload and inject into explorer.exe
bazzy

# Use custom payload and inject into explorer.exe
bazzy -p "your_base64_payload"

# Use custom payload and inject into specific process
bazzy -p "your_base64_payload" -t "notepad.exe"

# Execute shellcode directly without process injection
bazzy -p "your_base64_payload" -e

# Use default payload but inject into newly spawned process 
bazzy -t "notepad.exe"

Execution Modes

  • Direct Execution (-e): Executes the shellcode directly in the current process
  • Targeted Injection (-t): Creates a suspended process and injects the shellcode
  • Default Injection: Injects into explorer.exe if no other mode is specified

Command Line Options

  • -h, --help: Show help information
  • -p, --payload <base64>: Specify base64 encoded shellcode payload
  • -t, --target <process>: Specify target process name (default: explorer.exe)
  • -e, --execute: Execute shellcode directly without process injection

Disclaimer

This project is intended solely for educational and research purposes.

Contributing

Feel free to open issues and submit pull requests if you'd like to contribute.

Credits & Thanks

Inspired by the following projects:

About

Nim shellcode runner/injector

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages