Releases: lepotekil/MsfMania
Catalix:v3.0.1
Overview
MsfMania v3.0.1 introduces advanced code obfuscation and junkcode injection capabilities, significantly enhancing evasion techniques while maintaining the Docker-based architecture.
Changelog
Added
- Junkcode injection system with 52 mathematical and algorithmic functions
- Advanced code obfuscation with C keyword preservation
- RC4 encryption improvements with pseudo-random generation algorithm
- Encryption verbosity for detailed logging
- Modular architecture with separated obfuscation logic
- Mathematical junkcodes: trigonometric, logarithmic, and statistical functions
- Sorting algorithms: bubble sort, gnome sort, and shaker sort implementations
- Number theory functions: Fibonacci, Armstrong numbers, prime number algorithms
- Array manipulation: reverse, geometric, and statistical operations
- Command-line integration with --junkcodes parameter
- Smart injection avoiding loops and return statements
- Forward declarations for automatic function declaration generation
- Include management for automatic dependency resolution
- Syntax validation for balanced braces and parentheses
Enhanced
- Code obfuscation with improved identifier renaming
- RC4 encryption with enhanced pseudo-random generation
- Modularity with better separation of concerns
- Template system with enhanced C stub generation
- Build process with integrated junkcode injection
Removed
- Legacy evasion module (replaced with obfuscator.py)
- Unused variables (fixed compiler warnings)
Disclaimer
For educational and authorized security testing only. Unauthorized access is illegal. Authors assume no liability for misuse.
Resources
- Documentation: https://github.com/lepotekil/MsfMania/blob/master/README.md
- License: MIT
- Issues: https://github.com/lepotekil/MsfMania/issues
Catalix:v3.0.0
Overview
Complete rewrite of MsfMania. This major version removes the Metasploit dependency and introduces a Docker-based architecture.
WARNING: Breaking changes. Not backward compatible with v2.4.0.
Changelog
Added
- Docker-based build system with MinGW
- Polymorphic C stub with dynamic identifier generation
- RC4 encryption with configurable key size
- zlib compression before encryption
- djb2 hash payload integrity verification
- Recursive key bruteforce in stub
- PE metadata extraction and spoofing
- Multi-resolution icon extraction and injection
- Template-based C stub generation
- Example payloads
Removed
- Metasploit framework dependency
- Remote memory injection
- Junk code injection
- Run as Administrator flag
- Automatic Metasploit configuration
- Certificate signing
- UPX packing
- XOR encryption
Workflow change: No Metasploit required. Bring your own payload binary.
Disclaimer
For educational and authorized security testing only. Unauthorized access is illegal. Authors assume no liability for misuse.
Resources
- Documentation: https://github.com/lepotekil/MsfMania/blob/master/README.md
- License: MIT
- Issues: https://github.com/lepotekil/MsfMania/issues
NewBie:2.4.0
This is both the first and the final release of the project for the Python and C/C++ versions. Future development will take a completely new direction with version 3.