Skip to content

Releases: LittleAtariXE/Draconus

ver 1.1.1

02 Feb 18:18
Compare
Choose a tag to compare

🛠️ Changelog for Version 1.1.1

  • Added support for special "food" variables: These contain predefined data such as shellcodes and various worm-related data.
  • New worm: WinShell (x86) - A Windows 32-bit worm designed for testing shellcodes.
  • New worm: WinShell64 (x64) - A Windows 64-bit worm designed for testing shellcodes.
  • New worm: RiverRaid (x86) - Hides shellcode among multiple text variables. Generates both an EXE file and a separate DLL with injection functions, making detection more difficult.
  • New worm: BrutePID (x86) - Scans every process PID within a given range and attempts to inject shellcode into one of the processes.
  • New cross-compiler: MC_win64 - A 64-bit cross-compiler supporting C, C++, and assembler.
  • Added text display customization: In CONFIG.ini, a new option allows adjusting text display for different screen sizes.
  • More information added to the "Queen" console commands.
  • New DLL building system.
  • New wrapper: DropZone (not fully functional) - An experimental "worm-in-a-worm" system. It embeds a compiled worm inside a "wrapper worm" and attempts to execute it as a separate process. However, it struggles to handle large binary files (several MB). Work is ongoing to resolve this issue.
  • Added several new tools to assist in building different types of worms.
  • Bug fixes: Many small fixes, and probably some new bugs as well! 😄

ver 1.1

07 Jan 15:22
Compare
Choose a tag to compare
  • New payload building system: Now it's time to come up with something... :)
  • Added payload module: PS_DeliverObf - An obfuscated PowerShell payload with configurable options.
  • Added payload module: PyReverse - A reverse shell written in Python for both Windows and Linux.
  • Added main template: Worm Arkanoid - Enables the creation of DLL files with PowerShell payloads. Additionally, an EXE file is generated to call the payload function. The DLL libraries can be used in any other code.
  • Improved raw message handling from sockets: A message buffer was introduced to prevent the screen from being flooded with hundreds of single-character messages. See CONFIG.INI for more details.
  • New functionality: Automatically prepares a directory with only the necessary files for the worm to operate. If the worm requires several files, a folder with the worm's name is created, containing only the essential files.
  • Bug fixes: Addressed numerous small and significant issues.

v1.0.1

20 Dec 18:08
Compare
Choose a tag to compare

Improved reading of 'RAW' messages from network sockets.
Added 'payload' 'reverse shell' module in python for linux and windows.