FastFluxEvader is a tool designed to obfuscate payloads by converting them into hexadecimal format. It provides a simple method for payload masking, useful in security testing and Red Team engagements, where it’s essential to avoid detection through simple static analysis. This tool is designed for pre-processing payloads that will later be deobfuscated and executed by a loader.
- Payload Obfuscation: Transforms payloads into hexadecimal format to help avoid signature-based detection.
- Command-line Support: Offers flags to specify the payload and customization for flexible usage.
- Cross-Platform Compatibility: Supports both Linux and Windows installations.
After installation, you can use FastFluxEvader to obfuscate a payload directly from the command line. The obfuscated payload can then be passed to a loader or script for deobfuscation and execution.
-p
or--payload
: Specifies the payload string to obfuscate. Required.-h
or--help
: Displays help information about available flags.
To obfuscate a payload:
./FastFluxEvader -p "example_payload"
Example Output
Payload obfuscated: 6578616d706c655f7061796c6f6164
The output will be the obfuscated hexadecimal version of the specified payload, which can then be further processed as required.
FastFluxEvader can be installed on both Linux and Windows. Below are the installation instructions for each platform.
Clone the repository:
git clone https://github.com/xorganic/FastFluxEvader.git
cd FastFluxEvader
Run the setup script to install dependencies:
Ensure you have sudo permissions to install packages. The setup script will install cmake, nasm, and GoogleTest.
chmod +x setup.sh
./setup.sh
Build the project:
./build.sh
Run the tool: After the build completes, use the tool as described in the usage section.
./FastFluxEvader -p "example_payload"
Install Chocolatey (if not already installed):
Open Command Prompt as Administrator and run the following command:
@powershell -NoProfile -ExecutionPolicy Bypass -Command "Set-ExecutionPolicy Bypass -Scope Process; [System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12; Invoke-Expression ((New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1'))" && SET "PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin"
Clone the repository: Open a new Command Prompt and run:
git clone https://github.com/YourUsername/FastFluxEvader.git
cd FastFluxEvader
Run the setup script to install dependencies:
The setup script will use Chocolatey to install cmake and nasm.
setup.bat
Build the project:
After dependencies are installed, compile the project using cmake and nmake:
mkdir build
cd build
cmake ..
nmake
Run the tool:
Run the tool from the Command Prompt, providing the required payload flag.
FastFluxEvader.exe -p "example_payload"
FastFluxEvader includes unit tests using GoogleTest. On Linux, tests can be run with ctest after building the project. On Windows, you may need to build GoogleTest manually and configure the test paths in CMake.
cd build
ctest
Build GoogleTest from source if not already available. Configure test paths in CMakeLists.txt to point to your GoogleTest libraries. Run the tests using ctest from the build directory.
FastFluxEvader is licensed under the MIT License. Contributions are welcome!