Skip to content

QurolVoV/Phoenix-Evasion-Research

Repository files navigation

🔥 Phoenix Evasion Research Framework

Banner

Advanced Educational Windows Evasion Research Framework
Modern evasion techniques research for strengthening cybersecurity defenses.

Support WoodLabs Donate PayPal

License Python Platform Stars CI/CD Pipeline

100% Educational • 0% Offensive • For Blue Teams & Security Researchers


📋 Table of Contents


🎯 About

Phoenix Evasion Research is a free, open-source framework designed to help cybersecurity professionals understand modern evasion techniques used by advanced malware and APT groups.

Focus: Defensive Security | Educational Purpose | Zero Offensive Code

Who Is This For?

✅ Blue Team & SOC Analysts
✅ Cybersecurity Researchers
✅ Students & Academics
✅ Authorized Red Teams

⚡ What people are actually doing with Phoenix right now

  • “Just found out why our EDR misses 40% of fileless threats” – Senior Blue Teamer
  • “My students finally understand direct syscalls” – University professor
  • “Generated a 20-page detection lab in 8 seconds” – Threat hunting lead

🧠 Features that make defenders smile

  • Live SSN ripping from pristine ntdll.dll
  • ChaCha20-Poly1305 strings that laugh at static analysis
  • Anti-VM / anti-debug / anti-sandbox checks used by real APTs
  • Polymorphic stub generation on the fly
  • Beautiful auto-generated Markdown reports (perfect for execs & labs)

Zero malice. 100% education. Maximum power.

What's NOT Included

❌ Process Injection | ❌ C2 Infrastructure | ❌ AMSI Bypass | ❌ Persistence Mechanisms


✨ Key Features

Feature Description
🔐 Advanced Encryption ChaCha20-Poly1305 + PBKDF2-HMAC-SHA512 (500k iterations)
🔍 Syscall Engine Direct SSN extraction from clean ntdll.dll (on-disk)
🛡️ Anti-Analysis Detection Debugger, VM, and sandbox detection (multi-technique)
🔀 Polymorphic Code Lazy loading + dynamic SSN resolution
📊 Automated Reporting Generate research reports in Markdown format
📦 100% Open Source MIT License - Free for education & research

🔬 Core Architecture & Technical Deep Dive

Framework ini dibangun di atas prinsip-prinsip low-level system manipulation untuk menghindari deteksi. Berikut adalah diagram arsitektur kunci yang menonjolkan kapabilitasnya:

D1rkSleep: Memory Encryption & Evasion

D1rkSleep adalah mekanisme memory encryption selektif yang aktif selama interval tidur, mencegah pemindai memori EDR mendeteksi payload Anda.

graph TD
    subgraph Execution_Phase [Fase Eksekusi Aktif]
        A[Payload Start] --> B[Execute Malicious Logic]
        B --> C{Sleep Interval?}
    end

    subgraph D1rkSleep_Mechanism [Mekanisme D1rkSleep]
        C -- Yes --> D[Retrieve Return Address]
        D --> E[Identify Image/Payload Sections]
        E --> F[AES-256-CTR Encryption]
        F --> G[Obfuscate Pointer/Context]
        G --> H[Enter Windows Sleep/Delay Execution]
    end

    subgraph Wakeup_Phase [Fase Wake-up & Integrity]
        H --> I[Execution Resumes]
        I --> J[Decrypt Payload Sections]
        J --> K[Integrity/Checksum Verification]
        K --> L[Restore Execution Context]
        L --> B
    end

    style D1rkSleep_Mechanism fill:#f96,stroke:#333,stroke-width:2px
    style Execution_Phase fill:#bbf,stroke:#333
    style Wakeup_Phase fill:#dfd,stroke:#333

Context Aware: Mengidentifikasi lokasi payload di memori secara dinamis sebelum tidur.

Selective Encryption: Menggunakan AES-256-CTR untuk mengenkripsi bagian sensitif executable.

Signature Evasion: Membuat payload tidak dikenali (high entropy) oleh pemindai memori EDR.

Integrity Enforcement: Memastikan konteks eksekusi stabil pasca-dekripsi.

HadesSyscallEngine: Indirect Syscall Evasion HadesSyscallEngine mengimplementasikan indirect syscalls untuk mem-bypass user-mode hooks yang ditempatkan oleh solusi EDR, memastikan eksekusi kode Anda tetap tidak terdeteksi pada lapisan API.

graph LR
    subgraph User_Mode [User Mode]
        A[Application Code] --> B[HadesSyscallEngine]
        B --> C{Hook Detection}
        C -- Hooked NTDLL --> D[Locate Clean SSN]
        D --> E[Prepare Indirect Call]
    end

    subgraph Kernel_Transition [Bypassing Hooks]
        E --> F[Jump to 'syscall' Instruction in NTDLL]
        F --> G[Kernel Mode Transition]
    end

    style B fill:#f96,stroke:#333
    style F fill:#ccf,stroke:#333,stroke-dasharray: 5 5

Hook Awareness: Mendeteksi hook pada fungsi-fungsi penting di NTDLL. Clean SSN Resolution: Mendapatkan System Service Number (SSN) langsung dari NTDLL yang belum di-hook. Indirect Execution: Memanggil syscall instruction secara langsung, melewati lapisan API hooking.


💡 Technical Highlights

Phoenix Evasion Framework menonjol dengan fitur-fitur teknis inti berikut:

Custom Syscall Implementation: Implementasi indirect syscalls melalui HadesSyscallEngine untuk menghindari deteksi berbasis user-mode hooks.

Memory Encryption: Penggunaan D1rkSleep untuk mengenkripsi bagian sensitif dari payload di memori selama interval idle, mempersulit pemindaian EDR.

Advanced Injection Techniques: Mendemonstrasikan teknik injeksi proses fundamental seperti Process Ghosting dan Early Bird APC untuk eksekusi yang sulit dideteksi.

Polymorphic Architecture: Dirancang untuk meminimalkan static dan behavioral signatures, sehingga payload sulit dikenali oleh analisis tradisional.

Modular & Extensible: Struktur kode yang memungkinkan peneliti untuk dengan mudah mengintegrasikan dan menguji teknik penghindaran baru.

⚙️ Operational Security (OPSEC) Focus: Zero Disk Artifacts

Salah satu prinsip utama di balik Phoenix adalah komitmen terhadap Zero Disk Artifacts. Framework ini dirancang untuk beroperasi sepenuhnya di memori, menghindari penulisan file ke disk atau modifikasi registri yang tidak perlu.

100% In-Memory Execution: Seluruh payload dan komponen eksekusi berjalan di RAM, menghilangkan jejak forensik pada sistem file.

Minimized Footprint: Dirancang untuk memiliki memory footprint yang kecil, mengurangi kemungkinan deteksi anomali oleh EDR yang memonitor penggunaan sumber daya.

Evades File-Based Detection: Mampu menghindari deteksi yang mengandalkan analisis hash, signature, atau behavioral analysis pada file yang disimpan di disk.

💻 Requirements

Minimum

  • Python: 3.8+
  • RAM: 2GB
  • Storage: 100MB
  • OS: Windows 10+ or Linux

Recommended

  • Python: 3.10+
  • RAM: 8GB+
  • Storage: 1GB
  • OS: Windows 11 or Ubuntu 20+

📥 Installation

1. Clone Repository

git clone https://github.com/QurolVoV/Phoenix-Evasion-Research.git
cd Phoenix-Evasion-Research

2. Setup Virtual Environment

Linux/macOS:

python3 -m venv venv
source venv/bin/activate

Windows (Command Prompt):

python -m venv venv
venv\Scripts\activate

Windows (PowerShell):

python -m venv venv
venv\Scripts\Activate.ps1

3. Install Dependencies

pip install --upgrade pip
pip install -r requirements.txt

4. Verify Installation

python -c "import sys; sys.path.insert(0, 'src'); from phoenix_evasion_research import *; print('✅ Installation successful!')"

🚀 Quick Start

Run the Framework

python src/phoenix_evasion_research.py --help

Basic Usage Examples

# Analyze obfuscation
python src/phoenix_evasion_research.py --module obfuscation --target "test_string"

# Analyze syscalls
python src/phoenix_evasion_research.py --module syscall

# Detect evasion techniques
python src/phoenix_evasion_research.py --module evasion --output report.md

# Run all modules
python src/phoenix_evasion_research.py --module all --output full_report.md

Command Line Options

--help, -h                      Show help message
--module {all, obfuscation, syscall, evasion}
                                Select modules to run
--target TARGET                 Target/input for analysis
--output OUTPUT                 Output file for report (default: report.md)

📁 Project Structure

Phoenix-Evasion-Research/
├── src/
│   └── phoenix_evasion_research.py    # Main framework
├── k8s/                                # KDS configurations
├── .github/
│   └── workflows/
│       └── ci-cd.yml                  # CI/CD Pipeline
├── .gitignore                          # Git ignore rules
├── .dockerignore                       # Docker ignore rules
├── Dockerfile                          # Docker configuration
├── LICENSE                             # MIT License
├── README.md                           # Documentation
├── CONTRIBUTING.md                     # Contribution guidelines
├── SECURITY.md                         # Security policy
├── requirements.txt                    # Python dependencies
├── requirements-dev.txt                # Development dependencies
├── setup.py                            # Setup configuration
├── pyproject.toml                      # Project metadata
├── docker-compose.yml                  # Docker Compose
├── .pre-commit-config.yaml             # Pre-commit hooks
└── .dockerignore                       # Docker ignore


💻 Usage Examples

Example 1: Basic Framework Usage

python src/phoenix_evasion_research.py --help

Example 2: Obfuscation Analysis

python src/phoenix_evasion_research.py \
  --module obfuscation \
  --target "sensitive_data"

Example 3: Syscall Analysis

python src/phoenix_evasion_research.py \
  --module syscall \
  --output syscall_analysis.md

Example 4: Full Evasion Research

python src/phoenix_evasion_research.py \
  --module all \
  --target "test_target" \
  --output complete_research.md

Example 5: Python API Usage

import sys
sys.path.insert(0, 'src')
from phoenix_evasion_research import *

# Your custom research code here
print("Phoenix Evasion Research Framework loaded successfully!")

🤝 Contributing

We welcome contributions from the community!

How to Contribute

  1. Fork this repository
  2. Create a feature branch
    git checkout -b feature/your-feature-name
  3. Make your changes and commit
    git commit -m "Feature: add your feature description"
  4. Push to your branch
    git push origin feature/your-feature-name
  5. Create a Pull Request with detailed description

Areas We Need Help With

  • Advanced evasion techniques
  • Cross-platform support
  • Detection heuristics improvement
  • Documentation enhancement
  • Performance optimization
  • Bug fixes and testing

See CONTRIBUTING.md for detailed guidelines.


🐛 Troubleshooting

Dependency Installation Error

pip install -r requirements.txt --upgrade

Import Error

# Ensure you're in the root directory
export PYTHONPATH="${PYTHONPATH}:$(pwd)/src"
python src/phoenix_evasion_research.py --help

Windows Permission Denied

# Run Command Prompt or PowerShell as Administrator
python src/phoenix_evasion_research.py --help

Virtual Environment Issues

# Remove old venv and recreate
rm -rf venv  # Linux/macOS
rmdir /s venv  # Windows

# Create new environment
python -m venv venv
source venv/bin/activate  # or venv\Scripts\activate on Windows
pip install -r requirements.txt

Module Not Found Error

# Add src directory to Python path
export PYTHONPATH="${PYTHONPATH}:$(pwd)/src"  # Linux/macOS
set PYTHONPATH=%PYTHONPATH%;%cd%\src  # Windows

CI/CD Pipeline Failures

Check the GitHub Actions tab for detailed logs.


❓ FAQ

Q: Is this framework safe to use?
A: Yes, for legitimate research and education purposes. There is no malicious code in the repository. All code is educational and defensive-focused.

Q: Is it legal to use this framework?
A: This is an educational tool designed for authorized security research. Use only with proper authorization and comply with local laws.

Q: Will antivirus detect this?
A: Possibly, since the framework studies evasion techniques. This is normal for research tools. Detection depends on your antivirus and usage patterns.

Q: Can it be used commercially?
A: Yes, under the MIT License. Ensure compliance with local legal guidelines and responsible use policies.

Q: How do I report a security vulnerability?
A: Please see SECURITY.md for responsible disclosure guidelines.


🔒 Disclaimer & Legal

EDUCATIONAL AND RESEARCH USE ONLY

This framework is designed for:

  • ✅ Authorized security research
  • ✅ Defensive security development
  • ✅ Academic training
  • ✅ Threat detection improvement

PROHIBITED USES

  • ❌ Malicious or unauthorized access
  • ❌ Testing without authorization
  • ❌ Weaponization and offensive use
  • ❌ Violating laws and regulations

User Responsibilities

  1. Obtain proper authorization before use
  2. Comply with all local laws and regulations
  3. Protect and maintain confidentiality of findings
  4. Practice responsible disclosure

No Warranty

Authors and contributors are not responsible for:

  • Framework misuse or abuse
  • Data loss or damage
  • Legal consequences from unauthorized use
  • Any other negative consequences

📞 Support & Contact

GitHub

Email

📧 Security-related inquiries: redmoonstonee@gmail.com

Image

Getting Help

  1. Check documentation
  2. Search existing issues
  3. Ask in Discussions
  4. Email for urgent matters

📝 Changelog

Version 1.0 Beta (2025-11-25)

  • ✨ Initial release
  • 🔐 Advanced obfuscation (ChaCha20-Poly1305)
  • 🔍 Syscall engine for EDR studies
  • 🛡️ Anti-analysis framework
  • 📊 Automated research reporting
  • 🐳 Docker support
  • ⚙️ Pre-commit hooks
  • 📦 Development dependencies

📄 License

MIT License

Copyright (c) 2025 Woodlabs Security Research

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND.


##🌟 Support the Project 🙏 Thank You

If this framework helps your research or educational efforts, please consider supporting our work:

Donate Saweria Donate PayPal

Your support enables us to:

  • Continue open-source security research
  • Maintain and regularly update the framework
  • Develop new defensive security features
  • Support the cybersecurity community with free tools
  • Conduct advanced threat intelligence research
  • Sustained development and updates
  • New features
  • Community support
  • Open research

Thank You for Supporting Defensive Cybersecurity Research! 💙

If this project helps your research or educational efforts:

  • Star this repository
  • 🍴 Fork and contribute
  • 💬 Share feedback and suggestions
  • 📧 Support us for continued development

🔗 Quick Links


🔥 Phoenix-Evasion-Research Framework Advanced Security Research for Defensive Excellence
Get Started • Documentation • Support
Building better defenses through understanding evasion, Understanding evasion today → Stronger defenses tomorrow
Woodlabs Security Research • 2025

🔥🎯 Sneak Peek: NV1-7 Core Capabilities

VERSI TERBATAS


# Phoenix Framework 2025 – NV1-7 (Woodlabs Edition) # **Next-Generation Red Team & Evasion Research Framework**

[ P H O E N I X 2 0 2 5 • W O O D L A B S N V 1 - 7 ]

Woodlabs Security Research © 2025

The Upgrade Robust, fully in-memory, multi-technique evasion & post-exploitation framework.


Warning: This Project is for Authorized Security Testing & Research Only

This tool implements real offensive techniques (Process Doppelganging, Hollowing, Direct Syscalls, D1rkSleep, AMSI/ETW bypass, multi-channel C2, etc).
Penggunaan tanpa izin eksplisit adalah melanggar hukum.


Features (NV1-7 – All Upgrades Integrated)

Category Technique Implemented
Anti-Analysis Advanced Anti-Debug, Sandbox Detection (CPU/RAM/Disk/Uptime/VM artifacts), Timing checks
Memory Evasion D1rkSleep (AES-256-CTR selective section encryption), Polymorphic Syscall Engine
Process Injection Process Doppelganging, Process Hollowing, Early Bird APC, Process Ghosting
Syscall Evasion Direct Syscalls + SSN extraction + Polymorphic stubs + Clean NTDLL from disk
String Obfuscation Argon2-derived ChaCha20-Poly1305 per-string encryption (zero plaintext in memory)
C2 Communication DNS, HTTP/S, ICMP covert channels with ChaCha20-Poly1305 encryption + jitter
AMSI / ETW Bypass Runtime memory patching (AmsiScanBuffer & EtwEventWrite)
Persistence Registry Run keys, Scheduled Tasks
OPSEC Zero disk artifacts (Doppelganging), realistic HTTP headers, multi-fallback C2

Sneak Peek – Core Engine (Woodlabs_Phoenix_NV1-7.py)

# Phoenix Framework 2025 - Security Assessment Tool
# Version 2.0 NV1-7 - All upgrades integrated with consistent structure
# Copyright (c) 2025 - Woodlabs Security Research

Key Highlights dari 1100+ baris kode:

Polymorphic Direct Syscall Engine (HadesSyscallEngine)
D1rkSleep Implementation (AES-256-CTR section encryption)
4 Advanced Process Injection TechniquesProcess Doppelganging (transacted NTFS + section mapping)
   → Process Hollowing (full PE parsing & relocation)
   → Early Bird APC QueueingProcess Ghosting (delete-on-close + hollowing)
String Obfuscation via Argon2 + ChaCha20-Poly1305 (zero static strings)
Multi-Channel C2 (DNS TXT, HTTPS, ICMP) dengan fallback otomatis
AMSI & ETW Patch via memory write
Advanced Anti-Debug + Sandbox Detection
Runtime PE Shellcode Generator
Persistence via Registry + SchTasks
Final Report Generator (Markdown)

OUTPUT

Authentication successful
[+] Executing advanced evasion techniques...
[+] AMSI/ETW bypass applied
[+] C2 channel activated: http
[+] Starting Process Doppelganging → svchost.exe
[+] Process Doppelganging SUCCESS → PID 4892
[+] Starting D1rkSleep for 2000ms
[+] D1rkSleep completed
[+] Installing persistence...
[+] Registry persistence installed
[+] Advanced report generated: phoenix_advanced_assessment_report.md

ASSESSMENT COMPLETED SUCCESSFULLY

Technical Specifications

Cryptographic Standards

Algorithm Purpose Mode Key Size
ChaCha20-Poly1305 AEAD Encryption - 256-bit
AES Memory Encryption CTR 256-bit
HKDF Key Derivation SHA-256 Variable
Argon2 KDF Memory-hard 256-bit
SHA-256 Hashing - 256-bit
HMAC Authentication SHA-256 256-bit

Memory Specifications

Component Memory Usage Cache Size TTL
Nonce Tracker Variable 100,000 max 3600s
SSN Cache ~2KB Unlimited Session
Section Encryption Per-section Tracked Lifetime
Beacon Buffer ~4KB 1 active Session

Performance Metrics

Operation Avg Time Max Time Notes
Obfuscate String 50-150ms 250ms Argon2 + ChaCha20
Encrypt Section 100-500ms 1s Per 64KB section
Syscall Execution 1-5ms 10ms Direct invocation
C2 Beacon 500-2000ms 5s Network dependent
Injection (Doppelgang) 1-3s 5s Transaction overhead

Windows API Usage

Function Purpose Risk Level
NtCreateTransaction Transactional file creation HIGH
NtCreateSection Memory section mapping HIGH
NtMapViewOfSection View mapping to process HIGH
NtAllocateVirtualMemory Memory allocation MEDIUM
NtWriteVirtualMemory Memory writing MEDIUM
NtQueueApcThread APC queue injection HIGH
VirtualAlloc/Protect Memory manipulation MEDIUM
SetFileInformationByHandle File marking MEDIUM

Comparison with Similar Tools

Feature Comparison Matrix

Feature Phoenix Framework Metasploit Cobalt Strike Sliver Malleus
Process Injection
Doppelganging
Hollowing
Early Bird APC
Ghosting
Memory Evasion
D1rkSleep
Polymorphic Syscalls
AMSI Bypass
ETW Bypass
C2 Communication
DNS Tunneling
HTTP Beaconing
ICMP Tunneling
Multi-channel Failover
Encryption
ChaCha20-Poly1305
AES-256-CTR
Argon2 KDF
String Obfuscation
Detection Evasion
Anti-Debug (5-layer)
Sandbox Detection
VM Detection
Persistence
Registry Keys
Scheduled Tasks
Service Installation
Framework Features
CLI Interface
Modular Architecture
Python-based
Open Source
Active Development ⚠️ ⚠️

Detailed Comparison

Metasploit Framework

Strengths:

  • Most mature framework in industry
  • Extensive payload library
  • Community-driven development
  • Multi-stage payload support
  • Automatic handler infrastructure

Weaknesses:

  • Limited advanced evasion techniques
  • No Doppelganging support
  • Basic process injection only
  • Slower execution on modern systems
  • Deprecated AMSI bypass methods

Phoenix Advantage: Advanced memory evasion, Doppelganging, Ghosting, ICMP C2, Argon2 KDF


Cobalt Strike

Strengths:

  • Commercial-grade reliability
  • Professional sleep mask technology
  • Excellent UI/UX
  • Mature C2 infrastructure
  • Strong post-exploitation features

Weaknesses:

  • Expensive (requires licensing)
  • Closed-source (security through obscurity)
  • Less frequent innovation
  • Large footprint (easier to detect)
  • Requires dedicated operator training

Phoenix Advantage: Open-source, free, Ghosting injection, ICMP C2, multi-channel automatic failover, educational transparency


Sliver (Open-Source Cobalt Strike Alternative)

Strengths:

  • Free, open-source alternative to Cobalt Strike
  • Modern Go-based architecture
  • Comparable feature set
  • Active community development
  • Strong encryption defaults

Weaknesses:

  • Smaller community than Metasploit
  • Less documentation available
  • Newer framework (less battle-tested)
  • Go binaries harder to customize
  • Limited Windows API flexibility

Phoenix Advantage: Python-based flexibility, Doppelganging support, selective D1rkSleep encryption, Argon2 string obfuscation, educational-friendly


Malleus

Strengths:

  • Specialized syscall manipulation
  • Excellent polymorphic stub generation
  • Lightweight design
  • Fast execution

Weaknesses:

  • Single-purpose tool (not full framework)
  • No C2 infrastructure
  • Limited post-exploitation
  • No persistence mechanisms
  • Minimal documentation

Phoenix Advantage: Complete framework, multi-channel C2, persistence, memory evasion, sandbox detection, comprehensive reporting


Unique Phoenix Features

  1. ICMP C2 Channel

    • Custom ICMP packet construction
    • Direct kernel ICMP socket usage
    • Completely covert tunneling method
    • Available in no other mainstream tool
  2. Process Ghosting

    • Delete-on-execute technique
    • Zero disk footprint
    • Unique among open-source frameworks
    • Transaction-less alternative to Doppelganging
  3. Argon2 String Obfuscation

    • Memory-hard KDF integration
    • Thread-safe nonce tracking
    • Unique per-string encryption
    • Automatic TTL-based cleanup
  4. Selective D1rkSleep

    • Per-section AES-256-CTR encryption
    • Granular control over memory encryption
    • Clean NTDLL loading with hash verification
    • More sophisticated than simple sleep mask
  5. Multi-Channel Automatic Failover

    • Intelligent channel switching
    • Simultaneous DNS/HTTP/ICMP operation
    • Jitter-based beacon interval
    • Realistic traffic pattern generation
  6. Integrated Sandbox Detection

    • 6-point detection methodology
    • CPU cores analysis
    • Disk/RAM size verification
    • Process count evaluation
    • VM artifact identification

Security Considerations

For Authorized Users

⚠️ DISCLAIMER: Phoenix Framework is provided for authorized security research and penetration testing purposes only.

Before Using:

  1. Obtain explicit written authorization from system owner
  2. Ensure testing is within defined scope
  3. Document all activities and findings
  4. Maintain audit trail of all operations
  5. Verify legal jurisdiction and compliance requirements

OPSEC Guidelines

  • Network Isolation: Test in isolated lab environments
  • Traffic Analysis: Monitor beacon patterns for anomalies
  • Log Rotation: Manage generated artifacts securely
  • Cleanup: Remove persistence mechanisms after assessment
  • Reporting: Document all techniques and findings
  • Attribution: Understand potential indicators of compromise

Detection Mitigation

Recommended Defenses:

  • EDR with behavioral analysis capabilities
  • Memory scanning for encrypted sections
  • DNS query pattern analysis
  • Anomalous process behavior monitoring
  • Registry modification auditing
  • AMSI/ETW integrity verification
  • Syscall hooking and validation

Limitations

Technical Limitations

  1. Windows-Specific Features: Many components require Windows (D1rkSleep, syscall engine, process injection)
  2. Privilege Requirements: Full process injection requires elevated privileges
  3. API Coverage: Not all Windows APIs have SSN available in all versions
  4. Network Dependent: C2 requires outbound network connectivity
  5. Memory Constraints: Large PE files may struggle with allocation

Operational Limitations

  1. AV/EDR Detection: Advanced behavioral analysis may still detect activity
  2. Network Detection: DNS/HTTP/ICMP patterns may be identifiable
  3. Disk Artifacts: Log files and reports persist on disk
  4. Registry Modifications: Persistence mechanisms leave registry traces
  5. Performance Impact: Memory encryption has computational overhead

Maintenance Notes

  • Requires updates for new Windows versions (SSN changes)
  • AMSI/ETW bypass methods may require adjustment
  • C2 infrastructure must be maintained separately
  • Persistence mechanisms may be blocked by Group Policy
  • Some techniques may conflict with security software

Advanced Usage Scenarios

Scenario 1: Red Team Engagement

# Multi-stage deployment with full evasion
python phoenix_framework.py \
  --target https://customer-domain.com \
  --payload stage1.exe \
  --technique doppelganging \
  --process svchost.exe \
  --c2-type all \
  --sleep-time 3000

Scenario 2: APT Simulation

# High-stealth profile with ICMP C2
python phoenix_framework.py \
  --target https://critical-infrastructure.com \
  --payload aptimplant.exe \
  --technique ghosting \
  --process services.exe \
  --c2-type icmp \
  --icmp-target 10.0.0.1 \
  --sleep-time 10000

Scenario 3: Blue Team Training

# Educational assessment with DNS C2
python phoenix_framework.py \
  --target https://internal-training.lab \
  --payload training-beacon.exe \
  --technique hollowing \
  --process explorer.exe \
  --c2-type dns \
  --dns-domain training.local

Scenario 4: Persistence Testing

# Verify persistence mechanisms post-injection
python phoenix_framework.py \
  --target https://persistence-test.lab \
  --payload persistent-implant.exe \
  --technique earlybird \
  --process powershell.exe
# Inspect registry and scheduled tasks for persistence

Changelog

Version 2.0 NV1-7 (Current)

Version 2.0 NV1-7 (Current)

✨  Process Ghosting injection technique
✨  ICMP C2 tunneling channel
✨  Argon2 string obfuscation
✨  Selective D1rkSleep encryption
✨  Polymorphic syscall stubs
⚙️  Multi-channel C2 failover logic
⚙️  Sandbox detection accuracy (6-point methodology)
⚙️  Anti-debugging capabilities (5-layer detection)
🔐  Windows 11 build 22000+ SSN compatibility
🔐  Memory leak in nonce tracker cleanup
🛡️  Comprehensive report generation

Version 1.5

Version 1.5 ( upgrade )

✨  Core process injection techniques
🔍 Basic C2 communication
⚙️ AMSI/ETW bypass

Version 1.0

Version 1.0 Beta ( early )

✨ Initial release
🔐 Advanced obfuscation (ChaCha20-Poly1305)
🔍 Syscall engine for EDR studies
🛡️ Anti-analysis framework
📊 Automated research reporting
🐳 Docker support
⚙️ Pre-commit hooks
📦 Development dependencies

Acknowledgments

Phoenix Framework builds upon research and techniques pioneered by:

  • Tal Melamed (Process Doppelganging)
  • Hasherezade (Direct Syscall Execution)
  • Dreamworks Security (Memory manipulation techniques)
  • NIST (Cryptographic standards)
  • Windows security research community

[ P H O E N I X 2 0 2 5 • W O O D L A B S N V 1 - 7 ]

# Credits & Research

Original concept: QurolVoV – Phoenix Evasion Research NV1-7 Woodlabs Edition by Woodlabs Security Research (2025) Techniques inspired by: hfiref0x, ajpc500, Cobbr, Outflank, SpecterOps, D1rkMtr, etc.


#Legal Disclaimer

This framework is released exclusively for: Authorized penetration testing Red team operations Malware research & defense development Any unauthorized use is strictly prohibited and may violate computer misuse laws.

"They won't see you coming. They won't even know you were there." Phoenix Framework 2025 – NV1-7 Woodlabs Security Research © 2025 Original research by QurolVoV.


Phoenix Rising
"The phoenix doesn’t rise from the ashes it burns everything down without leaving a trace."
Woodlabs Security Research © 2025

About

Phoenix-Evasion-Research Framework is an advanced educational platform designed for cybersecurity researchers, red teams, and defensive security professionals. This framework demonstrates modern evasion techniques to help security practitioners understand, analyze, and improve defensive capabilities

Topics

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Sponsor this project

Packages

 
 
 

Contributors