-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathexample.py
50 lines (42 loc) · 1.3 KB
/
example.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
from gernig.modules import DebugAnalysis, DnsAnalysis, EventlogBlind, FileNoise, MACAddrAnalysis, CPUIDAnalysis, NetworkNoise, ProcessAnalysis, SleepAnalysis, RegistryNoise, UPXBlind
from gernig.noiser import Noiser, DnsNoise, PrintNoise
resolved_domains = [
"carcelery.ws",
"transporthandy.ws",
"chickensalt.co",
"peacefulprotective.music",
"woolsystem.ph",
"marvelousdelicate.music",
"unarmedvisit.kids",
"streamoil.ph",
"fangbottle.kids",
"suggestdecide.ws"
]
fake_domains = [
"ugliestform.tz",
"competitionparsimonious.med",
"affordiron.voting",
"coastvisit.jewelry",
"multiplyflesh.safe",
"tiresomeefficient.docs",
"holidaydisgusting.shangrila",
"wavesconsist.ferrari",
"dropeasy.fr",
"crayonsincere.lexus"
]
n = Noiser("target_program.exe")
n.addNoise(PrintNoise("testing"))
# n.addAnalysis(SleepAnalysis(360000))
# n.addNoise(DnsNoise())
# n.addNoise(FileNoise())
# n.addNoise(RegistryNoise())
# n.addNoise(NetworkNoise())
n.addAnalysis(DnsAnalysis("force", num_domain=8))
# n.addAnalysis(MACAddrAnalysis())
# n.addAnalysis(CPUIDAnalysis())
# n.addAnalysis(DebugAnalysis())
# n.addBlind(EventlogBlind())
# n.addAnalysis(ProcessAnalysis())
# Perform UPX obfuscation on the target binary
n.addBlind(UPXBlind())
n.generate("output.exe")