ENNAENNA

Amber

MIT

๐Ÿ”ฅ Offensive Ops ยท Go

Amber is a reflective PE packer written in Go that converts standard Windows PE (Portable Executable) files into position-independent shellcode payloads. It uses a reflective loading technique to execute PE files entirely in memory without writing them to disk, bypassing many traditional antivirus and endpoint detection mechanisms that rely on file-based scanning. Red team operators and exploit developers use Amber to prepare payloads for advanced adversary simulations, converting compiled executables into shellcode that can be injected into running processes or delivered through custom loaders. The tool supports both 32-bit and 64-bit PE files and can add custom stubs for additional evasion, making it a key component in payload development pipelines for authorized offensive engagements.

1.4kstars
221forks
4issues
Updated 2y ago

Tags

shellcodepackerevasionred-teamamberassemblycrypterpayloadpeshellcode-loaderstub

Details

Category
๐Ÿ”ฅ Offensive Ops
Language
Go
Repository
EgeBalci/amber
License
MIT
Platforms
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Community Reviews

No reviews yet. Be the first to review Amber.

More in Offensive Ops