Dedsec_nullsig
<img src="https://media0.giphy.com/media/v1.Y2lkPTc5MGI3NjExZzgxdHlsc3NodWczNGJuYXhidWxmNHNveGM5MnNiN2Y4dWxibzZrdyZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9cw/343T56FAm009yfPkzb/giphy.gif", width="500", height="500">
DEDSEC_NULLSIG
NullSig transforms Metasploit Linux payloads into undetectable binaries using signature removal, encryption, and AV evasion tactics.
DESCRIPTION
NullSig is a powerful payload transformation that takes standard Metasploit Linux payloads and converts them into highly evasive, undetectable binaries. It achieves this by removing known static signatures, applying strong encryption techniques, modifying the executable structure, and incorporating advanced anti-virus evasion tactics. NullSig not only disrupts traditional detection methods but also enhances payload stealth by introducing randomized obfuscation and in-memory execution strategies, making it a critical tool for red team operations, penetration testing, and advanced security research.
Virustotal
Default Payload vs NullSig Payload
FEATURES
- Signature removal
- Full encrypted
- In-memory execution
- Anti-forensics techniques
- Broken ELF header manipulation
- Unique randomized stub for each payload
- Process name spoofing to mimic legitimate system processes
INSTALLATION
* git clone https://github.com/0xbitx/DEDSEC_NULLSIG.git
* cd DEDSEC_NULLSIG
* chmod +x dedsec_nullsig
* sudo ./dedsec_nullsig
TESTED ON FOLLOWING
- Kali Linux
- Parrot OS
Support
If you find my work helpful and want to support me, consider making a donation. Your contribution will help me continue working on open-source projects.
Bitcoin Address: 36ALguYpTgFF3RztL4h2uFb3cRMzQALAcm