0xbit@home:~$

Dedsec_nullsig

<img src="https://media0.giphy.com/media/v1.Y2lkPTc5MGI3NjExZzgxdHlsc3NodWczNGJuYXhidWxmNHNveGM5MnNiN2Y4dWxibzZrdyZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9cw/343T56FAm009yfPkzb/giphy.gif", width="500", height="500">

DEDSEC_NULLSIG

NullSig transforms Metasploit Linux payloads into undetectable binaries using signature removal, encryption, and AV evasion tactics.

DESCRIPTION

NullSig is a powerful payload transformation that takes standard Metasploit Linux payloads and converts them into highly evasive, undetectable binaries. It achieves this by removing known static signatures, applying strong encryption techniques, modifying the executable structure, and incorporating advanced anti-virus evasion tactics. NullSig not only disrupts traditional detection methods but also enhances payload stealth by introducing randomized obfuscation and in-memory execution strategies, making it a critical tool for red team operations, penetration testing, and advanced security research.

Virustotal

Default Payload vs NullSig Payload

    

FEATURES

  • Signature removal
  • Full encrypted
  • In-memory execution
  • Anti-forensics techniques
  • Broken ELF header manipulation
  • Unique randomized stub for each payload
  • Process name spoofing to mimic legitimate system processes

INSTALLATION

* git clone https://github.com/0xbitx/DEDSEC_NULLSIG.git
* cd DEDSEC_NULLSIG
* chmod +x dedsec_nullsig
* sudo ./dedsec_nullsig

TESTED ON FOLLOWING

  • Kali Linux
  • Parrot OS

Support

If you find my work helpful and want to support me, consider making a donation. Your contribution will help me continue working on open-source projects.

Bitcoin Address: 36ALguYpTgFF3RztL4h2uFb3cRMzQALAcm

DISCLAIMER

I'm not responsible for anything you do with this program, so please only use it for good and educational purposes.