mirror of
https://github.com/tdeerenberg/InlineWhispers3.git
synced 2025-07-17 00:44:17 +00:00
32f7b7662b37c8d69adf9d1010c0704226dfa661
InlineWhispers3
InlineWhispers3 is an updated version of InlineWhispers2, designed to work with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOFs) using SysWhispers3. This tool helps changing SysWhispers3 generated files to be BOF compatible.
How to set this up?
# Clone the main repository and initialize submodules (SysWhispers3)
git clone --recurse-submodules https://github.com/tdeerenberg/InlineWhispers3
cd InlineWhispers3
# Navigate to submodule directory and run the syswhispers.py script
cd SysWhispers3/
python3 syswhispers.py -p all -a x64 -m jumper -o syscalls_all
# Navigate back to the main repository and run the InlineWhispers3.py script
cd ..
python3 InlineWhispers3.py --aio
This generates the required syscalls.c/h files and then runs InlineWhispers3 to make the files compatible with BOFs.
The
--aio
flag is optional and merges all output files into one.h
file, which can also be used instead of usingsyscalls.c
,syscalls.h
, andsyscalls-asm.h
How to use indirect syscalls in your BOF
Import syscalls.h
, syscalls.c
, and syscalls-asm.h
(or only syscalls-aio.h
) in your project and include syscalls.c
(or syscalls-aio.h
) in your C code to start using syscalls.
An example BOF for reference (creates a new process using
):
#include <windows.h>
#include "beacon.h"
#include "syscalls.c"
void go(char* args, int length) {
... CODE TO BE ADDED ...
}
Credits
- @klezVirus for SysWhispers3
- @Sh0ckFR for InlineWhispers2
- @outflanknl for the first version of InlineWhispers and their informative blog post about it
- The Cyber Security Community for all the articles and resources
Description
Tool for working with Indirect System Calls in Cobalt Strike's Beacon Object Files (BOF) using SysWhispers3 for EDR evasion
beacon-object-filebeaconobjectfilebofcobalt-strikecobaltstrikecybersecurityedr-evasionevasion-techniquesoffensive-securityred-teamred-team-engagementred-team-toolsred-teamingredteamsyscallsyscallswindowswindows-api
Readme
GPL-3.0
212 KiB
Languages
C
73.6%
Assembly
23.3%
Python
3.1%