03-09-2025, 05:32 AM
This script is a fully operational tool designed for educational purposes and must be used only in a controlled, isolated homelab environment to test security measures safely. It comes packed with powerful features: it performs sandbox and debugger detection by checking for virtual machines (like VirtualBox or VMware) or debugging tools, exiting if it senses them to avoid being analyzed; it uses reflective DLL injection to decrypt an encrypted DLL and load it directly into a target process like explorer.exe without relying on the Windows loader, making it stealthy; it attempts network propagation by sending a payload over port 445 (SMB) to spread to other machines on the same subnet if they’re vulnerable; and it ensures persistence by adding itself to the Windows Startup folder to run on every reboot. Because this script is real and potent, you need to handle it responsibly. To use it safely, start by creating a benign DLL (e.g., one that shows a test message), encrypt it with your own AES-128-CBC key and IV, and embed the encrypted bytes into the script. Install the psutil library to dynamically select a process like explorer.exe for injection. Set up test machines in your isolated homelab to receive the propagation payload on port 445, and run the script only within this contained network to prevent any accidental spread or detection. After you’re done testing, clean up by removing the script from the Startup folder and deleting all temporary files or logs it might have created. i will send in plain. text