bats3c / darkarmour

Windows AV Evasion
https://blog.dylan.codes/bypassing-av-via/
MIT License
727 stars 119 forks source link

cobaltstrike #2

Closed ghost closed 4 years ago

ghost commented 4 years ago

hi thanks for sharing such great tool, but it is not working with raw shellcode of cobalstrike it give me this error Traceback (most recent call last): File "./darkarmour.py", line 116, in darkarmour.run(vars(ap.parse_args())) File "./darkarmour.py", line 96, in run self._do_crypt() File "./darkarmour.py", line 86, in _do_crypt print(f"[i] Started armouring {self.in_file} ({auxiliary.get_size(self.in_file)} bytes)") File "/root/darkarmour/lib/auxiliary.py", line 11, in get_size with open(filename, "rb") as file: TypeError: expected str, bytes or os.PathLike object, not NoneType

bats3c commented 4 years ago

yeh sorry the shellcode feature isn't fully implemented yet, I'll have it sorted in the next couple releases