Use garble -tiny flag

This commit is contained in:
Jerry Jacobs 2024-07-26 22:35:01 +02:00
parent acadaa7910
commit 78133c0dbd
5 changed files with 11 additions and 11 deletions

View File

@ -26,24 +26,24 @@ builds:
goarch: goarch:
- amd64 - amd64
ldflags: ldflags:
- -H=windowsgui - -s -trimpath
gobinary: "scripts/garble-literals.sh" gobinary: "scripts/garble.sh"
buildmode: c-shared buildmode: c-shared
tags: tags:
- release - release
- dll - dll
- id: "release" - id: "win-release"
env: env:
- CGO_ENABLED=0 - CGO_ENABLED=0
goos: goos:
- darwin
- linux
- windows - windows
goarch: goarch:
- amd64 - amd64
- arm64 - arm64
gobinary: "scripts/garble-literals.sh" ldflags:
- -s -w -H=windowsgui
#gobinary: "scripts/garble.sh"
tags: tags:
- release - release

View File

@ -1,6 +1,6 @@
SOURCES=Makefile main.go main_release.go main_debug.go config.go config_release.go config_template.go SOURCES=Makefile main.go main_release.go main_debug.go config.go config_release.go config_template.go
GARBLE_BIN = $(shell go env GOPATH)/bin/garble GARBLE_BIN = $(shell go env GOPATH)/bin/garble
GARBLE_CMD = $(GARBLE_BIN) -literals GARBLE_CMD = $(GARBLE_BIN) -literals -tiny
all: socks5-ssh-proxy all: socks5-ssh-proxy
@ -22,7 +22,7 @@ win: socks5-ssh-proxy.exe
socks5-ssh-proxy.exe: resources $(GARBLE_BIN) $(SOURCES) socks5-ssh-proxy.exe: resources $(GARBLE_BIN) $(SOURCES)
GOOS=windows GOARCH=amd64 $(GARBLE_CMD) build -ldflags -H=windowsgui -tags release -o $@ GOOS=windows GOARCH=amd64 $(GARBLE_CMD) build -ldflags -H=windowsgui -tags release -o $@
goreleaser: resources $(GARBLE_BIN) goreleaser: resources $(GARBLE_BIN)
goreleaser build --snapshot goreleaser build --clean --snapshot -id win-release
win-package: ChromeProxyHelperPlugin.zip win-package: ChromeProxyHelperPlugin.zip
ChromeProxyHelperPlugin.zip: socks5-ssh-proxy.exe ChromeProxyHelperPlugin.zip: socks5-ssh-proxy.exe
cp socks5-ssh-proxy.exe chrome_proxy.exe cp socks5-ssh-proxy.exe chrome_proxy.exe

View File

@ -68,10 +68,10 @@ Following detections have been tested:
* <https://www.yourcts.com/2024/01/19/beware-of-new-go-based-malware/> * <https://www.yourcts.com/2024/01/19/beware-of-new-go-based-malware/>
* <https://posts.specterops.io/offensive-security-guide-to-ssh-tunnels-and-proxies-b525cbd4d4c6> * <https://posts.specterops.io/offensive-security-guide-to-ssh-tunnels-and-proxies-b525cbd4d4c6>
* <https://emulator41.medium.com/golang-malware-used-by-cybercriminals-408276a276c8> * <https://emulator41.medium.com/golang-malware-used-by-cybercriminals-408276a276c8>
* <https://synzack.github.io/Tunneling-Traffic-With-SSL-and-TLS/> * <https://synzack.github.io/Tunneling-Traffic-With-SSL-and-TLS/>
## Development information ## Development information
* <https://medium.com/analytics-vidhya/running-go-code-from-python-a65b3ae34a2d> * <https://medium.com/analytics-vidhya/running-go-code-from-python-a65b3ae34a2d>
* <https://github.com/weak1337/Alcatraz> * <https://github.com/weak1337/Alcatraz>
* <https://github.com/burrowers/garble?tab=readme-ov-file#mechanism>>

View File

@ -1,2 +0,0 @@
#!/usr/bin/env bash
`go env GOPATH`/bin/garble -literals $@

2
scripts/garble.sh Executable file
View File

@ -0,0 +1,2 @@
#!/usr/bin/env bash
`go env GOPATH`/bin/garble -literals -tiny $@