Windows exploit toolkit. Under construction.
Blackf8 is not an exploit. It is several. blackf8 is the core exploitation kit behind the c0deblack customization tool.
Do NOT download blackf8 or c0deblack from ANY websiite or repository other then the official ones located at:
ALL official releases are signed with my PGP key 0x475FAB06. My keys are on the GnuPG keyservers: http://keys.gnupg.net/pks/lookup?op=vindex&fingerprint=on&search=0x1564B84C475FAB06
Always verify the signature before running anything. If it fails, DO NOT RUN and instead create an issue here. IF IT ISNT SIGNED, IT ISNT SAFE.
It is EXTREMELY EASY to create a rootkit from this software. ONLY TRUST OFFICIAL RELEASES, and don't even trust those, compile the program from source yourself.
blackf8 and c0deblack are inheritley dangerous. They modify system files and overwrite the bootloader, as well as hijack parts of the operating system. To the perspective of an antivirus, it looks like a rootkit, because thats exactly what blackf8 is. Blackf8 IS a rootkit, simply one without malicious intentions. Don't install things you dont trust, that is why the source code is provided. While data loss is unlikely, make a backup aynway, because stuff can go wrong with the things this tool does. We are not responsible for any data loss due to use of this tool.
blackf8 contains several main exploits, known as modules: (^ denotes an exploit that requires a reboot to setup or run, * denotes an exploit that requires CLB mode to setup or run)
- UEFIHack (ml.coresdev.blackf8.blackf8_uefi) ^
- SysModuleRunner (ml.coresdev.blackf8.blackf8_servicerun) *
- WinFSMod (ml.coresdev.blackf8.blackf8_allfileaccess) *
- Unremove (ml.coresdev.blackf8.blackf8_unremove)
- DiskEdit (ml.coresdev.blackf8.blackf8_diskmod) *
- PkgLoader (ml.coresdev.blackf8.blackf8_pkgload) *
- ProgramHider (ml.coresdev.blackf8.blackf8_semikit) *
- Blackout (ml.coresdev.blackf8.blackf8_blackout) * ^
- USBInterface (ml.coresdev.blackf8.blackf8_iusb)
- CLBMode (ml.coresdev.blackf8.blackf8_clbexploit)
- uefiboot (ml.coresdev.blackf8.blackf8_uefiboot)
- UEFILogoChanger (ml.coresdev.blackf8.blackf8_uefilogochanger)
Currently unavaliable, will be released once I figure out how to create symbolic links in Git.
- Any windows 10 version
- NT Kernel version 10.0 or above
- Secure boot disabled (unless you know how to sign EFI stuff)
- Antivirus should be disabled for installation of exploits, but can be re-enabled afterwards
- UEFI Boot scheme (for UEFIhack and kernel modifications)
To all of my tests, this exploit is completley safe. However, this is a kernel modification tool. We are putting custom, unsigned code into the Windows kernel.
Make a backup of your kernel before running, and all of your data for that matter.
-=-=-=-=-=-=-
Even this document is signed
Signature in readme.md.sig
Trust nobody
- core