Implementing a Plug-in System with Extism. Serialize the Plugin struct with Cap'n Proto for backward compatibility. Refactor the project code.
🎃 PumpBin
PumpBin is an Implant Generation Platform.
To use PumpBin, you need to have a b1n file or Create One. A b1n file contains one or more binary implant templates, along with some additional descriptive information. We refer to a b1n file as a Plugin.
✨ Features
- Powerful, simple, and comfortable UI
- Following the minimal principle to ensure maximum flexibility in usage
- Support two Plugin types: shellcode embedded in implants(Local) and hosted on remote servers(Remote)
- Support plugin development using any compiled language, such as C/C++, Rust, Zig, Go, etc
- Re-selecting the current plugin will generate a new random encryption password
- Filling with random data to ensure each generated implant is unique
- We have user manual, you no longer need to educate your users
- No dependencies, just PumpBin
- Support description, you can write down anything you want to remind users, which is important
- No network connection, eliminating any security concerns
- ... And I'm a pumpkin, I have magic🪄
🚀 Getting Started
Check the PumpBin Documentation for more information.
❔ Why
Modern cybersecurity teams are divided into offensive personnel and cybersecurity researchers, with researchers responsible for producing digital weapons. The teams typically deploy post-exploitationtools like Cobalt Strike, BRC4, or similar. To evade security software, researchers usually write shellcode loaders, including evasion code to create the final implant. This process generally follows two methods.
-
Offensive personnel provide the shellcode to researchers, who then directly produce the final implant. This method is highly inflexible as offensive personnel must contact researchers every time they need a final implant.
-
Researchers create a binary implant template and provide a final implant generation program. Offensive personnel use this program to inject shellcode into the binary implant template, producing the final implant.
The second method is the reason for the creation of PumpBin, a final implant generation program. Cybersecurity researchers only need to follow PumpBin's guidelines to write implant templates and distribute them along with PumpBin to offensive personnel. (There are very few guidelines as PumpBin is highly flexible.)
