Evolve. Adapt. Overcome.
Chameleon is a cutting-edge red-teaming tool that embodies the art of stealth and adaptability in cybersecurity. Inspired by the natural camouflage abilities of its namesake, this project showcases advanced techniques to hide and execute shellcode while evading modern defenses.
Whether you're a red teamer looking to sharpen your offensive tactics or a blue teamer aiming to bolster your defensive strategies, Chameleon provides the perfect balance of practicality and education.
-
🛡 Payload Placement
Master various techniques to store shellcode securely within different file types and system locations. -
🔒 Payload Encryption
Utilize encryption to obscure payloads and bypass antivirus and endpoint detection solutions. -
🌀 Payload Obfuscation
Leverage obfuscation strategies to ensure shellcode remains undetected and resilient to signature-based detection. -
🧩 Red Team Scenarios
Practical demonstrations for executing payloads in realistic attack scenarios. -
📘 Educational Focus
Aimed at empowering both offensive and defensive teams to better understand modern attack vectors.
Chameleon bridges the gap between red and blue teams by highlighting the tactics, techniques, and procedures (TTPs) used in advanced adversarial campaigns. This repository serves as:
- A tool for red teams to refine their craft.
- A training resource for blue teams to learn detection and mitigation strategies.
- A platform for collaboration and knowledge sharing in the cybersecurity community.
-
Clone the Repository
git clone https://github.com/yourusername/chameleon.git cd chameleon
-
Dependencies
Install required libraries and tools (will be detailed in future documentation). -
msfvenom
msfvenom -p windows/x64/exec -f raw EXITFUNC=threadCMD=calc.exe -o payload.bin
-
Run Your First Module
gcc -o chameleon chameleon.c modules/xor.c modules/shellcode.c .\chameleon.exe xor
- Basic Payload Obfuscation: XOR and Base64 encoding.
- Advanced Payload Placement: Embedding in image files, registries, and memory.
- Encryption Modules: AES, RC4, and custom encryption methods.
- Execution Techniques: DLL injection, process hollowing, and remote thread creation.
This project is for educational purposes only. It is intended to help organizations understand and mitigate advanced attack techniques. Use responsibly and ethically.
We welcome contributions! If you have ideas, enhancements, or bug fixes, feel free to submit a pull request.
💻 Chameleon — where stealth meets adaptability.