oddcod3 / Phantom-Evasion

Python antivirus evasion tool
GNU General Public License v3.0
1.39k stars 334 forks source link

Request for help (and maybe documentation?) #75

Open harrihaven2 opened 4 years ago

harrihaven2 commented 4 years ago

Hey there!

This is a really amazing project that has some unique features I haven't seen anywhere else and I'm really appreciative of the work I see that has been put into this!

I'm having trouble with specifying custom shellcode on the command line, and I can't find any examples or documentation regarding it.

What I've tried:

  1. Using the "-cp" flag followed by a hex byte string delimited by slashes (i.e. "0xfc\0xe8\0x82")
  2. Using the "-cp" flag followed by the relative path to the file with the hex byte string on a single line.
  3. Using the "-cp" flag followed by the absolute path to the file with the hex byte string on a single line.
  4. Using the "-cp" flag followed by a hex byte string delimited by commas.

Any guidance would be much appreciated!

harrihaven2 commented 4 years ago

I forgot to add the error message I get!

[ERROR] Msfvenom shellcode options require Host (-H) and Port (-P) arguments

Traceback (most recent call last): File "phantom-evasion.py", line 396, in Phantom_lib.CmdlineLauncher(sys.argv) File "Setup/Phantom_lib.py", line 1114, in CmdlineLauncher if "reverse" in args.msfvenom: TypeError: argument of type 'NoneType' is not iterable

I'm not specifying a msfvenom command, and that seems to be the problem. But I'm specifying a "-cp" flag and it looks like in lines 990-992 that they are mutually excluding parameters. Where am I going wrong?