Skip to content

The tool demonstrates practical applications for red-teaming operations, simulating real-world adversarial tactics to bypass defenses like antivirus software and EDR solutions. With a modular design, Chameleon serves as both a training resource and a utility for penetration testing

Notifications You must be signed in to change notification settings

xsudoxx/Chameleon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🦎 Chameleon

Evolve. Adapt. Overcome.

Chameleon is a cutting-edge red-teaming tool that embodies the art of stealth and adaptability in cybersecurity. Inspired by the natural camouflage abilities of its namesake, this project showcases advanced techniques to hide and execute shellcode while evading modern defenses.

Whether you're a red teamer looking to sharpen your offensive tactics or a blue teamer aiming to bolster your defensive strategies, Chameleon provides the perfect balance of practicality and education.


Key Features

  • 🛡 Payload Placement
    Master various techniques to store shellcode securely within different file types and system locations.

  • 🔒 Payload Encryption
    Utilize encryption to obscure payloads and bypass antivirus and endpoint detection solutions.

  • 🌀 Payload Obfuscation
    Leverage obfuscation strategies to ensure shellcode remains undetected and resilient to signature-based detection.

  • 🧩 Red Team Scenarios
    Practical demonstrations for executing payloads in realistic attack scenarios.

  • 📘 Educational Focus
    Aimed at empowering both offensive and defensive teams to better understand modern attack vectors.


🎯 Purpose

Chameleon bridges the gap between red and blue teams by highlighting the tactics, techniques, and procedures (TTPs) used in advanced adversarial campaigns. This repository serves as:

  • A tool for red teams to refine their craft.
  • A training resource for blue teams to learn detection and mitigation strategies.
  • A platform for collaboration and knowledge sharing in the cybersecurity community.

🛠 Getting Started

  1. Clone the Repository

    git clone https://github.com/yourusername/chameleon.git
    cd chameleon
  2. Dependencies
    Install required libraries and tools (will be detailed in future documentation).

  3. msfvenom

    msfvenom -p windows/x64/exec -f raw EXITFUNC=threadCMD=calc.exe -o payload.bin
    
  4. Run Your First Module

    gcc -o chameleon chameleon.c modules/xor.c modules/shellcode.c
    .\chameleon.exe xor
    

📂 Planned Modules

  • Basic Payload Obfuscation: XOR and Base64 encoding.
  • Advanced Payload Placement: Embedding in image files, registries, and memory.
  • Encryption Modules: AES, RC4, and custom encryption methods.
  • Execution Techniques: DLL injection, process hollowing, and remote thread creation.

🚨 Disclaimer

This project is for educational purposes only. It is intended to help organizations understand and mitigate advanced attack techniques. Use responsibly and ethically.


💡 Contributing

We welcome contributions! If you have ideas, enhancements, or bug fixes, feel free to submit a pull request.


🔗 Connect With Us


💻 Chameleon — where stealth meets adaptability.

About

The tool demonstrates practical applications for red-teaming operations, simulating real-world adversarial tactics to bypass defenses like antivirus software and EDR solutions. With a modular design, Chameleon serves as both a training resource and a utility for penetration testing

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages