• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Reverse Engineering Amber 2.0 - Reflective PE packer

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,607
Solutions
2
Reputation
32
Reaction score
100,453
Points
2,313
Credits
32,590
‎6 Years of Service‎
 
76%
68747470733a2f2f70656e746573742e626c6f672f77702d636f6e74656e742f75706c6f6164732f616d6265725f325f305f.png


amber is a reflective PE packer for bypassing security products and mitigations. It can pack regularly compiled PE files into reflective payloads that can load and execute itself like a shellcode. It enables stealthy in-memory payload deployment that can be used to bypass anti-virus, firewall, IDS, IPS products and application white-listing mitigations. If you want to learn more about the packing methodology used inside amber check out below.

New Features

    x64 support added !
    Support for MacOS and Windows (Currently supporting all major platforms)
    Assembly stubs rewritten
    External dependencies reduced to two
    C++ stubs converted to go
    All project converted into a go package

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top