Releases: LittleAtariXE/Draconus
Releases · LittleAtariXE/Draconus
ver 1.1.1
🛠️ Changelog for Version 1.1.1
- Added support for special "food" variables: These contain predefined data such as shellcodes and various worm-related data.
- New worm:
WinShell
(x86) - A Windows 32-bit worm designed for testing shellcodes. - New worm:
WinShell64
(x64) - A Windows 64-bit worm designed for testing shellcodes. - New worm:
RiverRaid
(x86) - Hides shellcode among multiple text variables. Generates both an EXE file and a separate DLL with injection functions, making detection more difficult. - New worm:
BrutePID
(x86) - Scans every process PID within a given range and attempts to inject shellcode into one of the processes. - New cross-compiler:
MC_win64
- A 64-bit cross-compiler supporting C, C++, and assembler. - Added text display customization: In
CONFIG.ini
, a new option allows adjusting text display for different screen sizes. - More information added to the "Queen" console commands.
- New DLL building system.
- New wrapper:
DropZone
(not fully functional) - An experimental "worm-in-a-worm" system. It embeds a compiled worm inside a "wrapper worm" and attempts to execute it as a separate process. However, it struggles to handle large binary files (several MB). Work is ongoing to resolve this issue. - Added several new tools to assist in building different types of worms.
- Bug fixes: Many small fixes, and probably some new bugs as well! 😄
ver 1.1
- New payload building system: Now it's time to come up with something... :)
- Added payload module:
PS_DeliverObf
- An obfuscated PowerShell payload with configurable options. - Added payload module:
PyReverse
- A reverse shell written in Python for both Windows and Linux. - Added main template:
Worm Arkanoid
- Enables the creation of DLL files with PowerShell payloads. Additionally, an EXE file is generated to call the payload function. The DLL libraries can be used in any other code. - Improved raw message handling from sockets: A message buffer was introduced to prevent the screen from being flooded with hundreds of single-character messages. See
CONFIG.INI
for more details. - New functionality: Automatically prepares a directory with only the necessary files for the worm to operate. If the worm requires several files, a folder with the worm's name is created, containing only the essential files.
- Bug fixes: Addressed numerous small and significant issues.
v1.0.1
Improved reading of 'RAW' messages from network sockets.
Added 'payload' 'reverse shell' module in python for linux and windows.