Skip to content

Releases: lepotekil/MsfMania

Catalix:v3.0.1

14 Oct 19:30

Choose a tag to compare

Overview

MsfMania v3.0.1 introduces advanced code obfuscation and junkcode injection capabilities, significantly enhancing evasion techniques while maintaining the Docker-based architecture.

Changelog

Added

  • Junkcode injection system with 52 mathematical and algorithmic functions
  • Advanced code obfuscation with C keyword preservation
  • RC4 encryption improvements with pseudo-random generation algorithm
  • Encryption verbosity for detailed logging
  • Modular architecture with separated obfuscation logic
  • Mathematical junkcodes: trigonometric, logarithmic, and statistical functions
  • Sorting algorithms: bubble sort, gnome sort, and shaker sort implementations
  • Number theory functions: Fibonacci, Armstrong numbers, prime number algorithms
  • Array manipulation: reverse, geometric, and statistical operations
  • Command-line integration with --junkcodes parameter
  • Smart injection avoiding loops and return statements
  • Forward declarations for automatic function declaration generation
  • Include management for automatic dependency resolution
  • Syntax validation for balanced braces and parentheses

Enhanced

  • Code obfuscation with improved identifier renaming
  • RC4 encryption with enhanced pseudo-random generation
  • Modularity with better separation of concerns
  • Template system with enhanced C stub generation
  • Build process with integrated junkcode injection

Removed

  • Legacy evasion module (replaced with obfuscator.py)
  • Unused variables (fixed compiler warnings)

Disclaimer

For educational and authorized security testing only. Unauthorized access is illegal. Authors assume no liability for misuse.

Resources

Catalix:v3.0.0

12 Oct 06:29

Choose a tag to compare

Overview

Complete rewrite of MsfMania. This major version removes the Metasploit dependency and introduces a Docker-based architecture.

WARNING: Breaking changes. Not backward compatible with v2.4.0.

Changelog

Added

  • Docker-based build system with MinGW
  • Polymorphic C stub with dynamic identifier generation
  • RC4 encryption with configurable key size
  • zlib compression before encryption
  • djb2 hash payload integrity verification
  • Recursive key bruteforce in stub
  • PE metadata extraction and spoofing
  • Multi-resolution icon extraction and injection
  • Template-based C stub generation
  • Example payloads

Removed

  • Metasploit framework dependency
  • Remote memory injection
  • Junk code injection
  • Run as Administrator flag
  • Automatic Metasploit configuration
  • Certificate signing
  • UPX packing
  • XOR encryption

Workflow change: No Metasploit required. Bring your own payload binary.

Disclaimer

For educational and authorized security testing only. Unauthorized access is illegal. Authors assume no liability for misuse.

Resources

NewBie:2.4.0

24 Jan 20:06

Choose a tag to compare

This is both the first and the final release of the project for the Python and C/C++ versions. Future development will take a completely new direction with version 3.