Skip to content

Commit 84856ea

Browse files
committed
add usage guide
1 parent 55cba65 commit 84856ea

File tree

2 files changed

+18
-1
lines changed

2 files changed

+18
-1
lines changed

README.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,23 @@ go build -o crypt.exe ./crypt
111111
go build -o stub.exe ./stub
112112
```
113113

114+
## Running
115+
```bash
116+
# after running the crypter tool and building the stub, you can pass some flags to specify how you want to run
117+
118+
./stub.exe -sleepy # self inject with page no access delay to trip EDRs
119+
120+
./stub.exe -ghost # self inject standard
121+
122+
./stub.exe -phantom # inject with queueapc + page no access delay
123+
124+
# or
125+
126+
./stub.exe # with no flags to run an embedded EXE or shellcode with the default methods
127+
128+
```
129+
130+
114131
## Security Considerations
115132

116133
This tool is designed for security research, penetration testing, and red team exercises. Users are responsible for ensuring compliance with applicable laws and regulations in their jurisdiction.

pkg/runshellalt/runshellalt.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -302,7 +302,7 @@ func GhostStack(shellcode []byte) error {
302302
}
303303

304304
// PhantomAPC executes shellcode using APC injection via NtQueueApcThreadEx
305-
// This is absolutely MENTAL - uses Asynchronous Procedure Call injection with direct syscalls
305+
306306
func PhantomAPC(shellcode []byte) error {
307307
if len(shellcode) == 0 {
308308
return fmt.Errorf("shellcode cannot be empty")

0 commit comments

Comments
 (0)