Kharon is a fully Position-Independent Code (PIC) agent that operates without a reflective loader. It incorporates multiple evasion mechanisms, including sleep obfuscation, heap obfuscation during sleep, stack spoofing with indirect syscalls, a BOF API proxy for spoofed and indirect BOF API execution, and AMSI/ETW bypass.
For detailed information about features, setup, and usage, check the official documentation here
Kharon uses a class-based design to store the beacon instance.
The instance is retrieved using a magic value stored in a custom heap, allowing reliable access without relying on global symbols.
This section covers the main capabilities related to evasion, malleable profiles, and runtime control.
- Proxy configuration (URL, username, and password)
- Domain rotation strategies:
- Random
- Failover
- Round-robin
- Multi-host configuration
- Independent User-Agent and headers for GET and POST requests
- Custom parameters
- Fine-grained control over route behavior:
- Output data via body, parameter, or header
- Append / Prepend output data
- Custom empty server responses
- Custom error responses
Documentation here: http-malleable
Post-exploitation routines are based on Beacon Object Files (BOFs) and PIC shellcode, which can be executed:
- In the current process (BOF/PIC)
- In a remote target process (PIC)
-
Spoofed + Indirect Syscalls
Applies call stack spoofing to selected API executions. -
BOF API Proxy
Proxies BOF API calls to enable spoofed call stacks and indirect syscalls. -
Memory Evasion
- Sleep obfuscation
- Heap masking during beacon sleep
Kharon supports live runtime configuration updates using the config command.
This allows dynamic changes to beacon behavior, including:
- Kill date (date-based or self-delete)
- Working hours
- BOF API proxy enable/disable
- Spoofed + indirect syscall enable/disable
- Memory obfuscation:
- Heap masking status
- Beacon masking technique
- Process creation behavior:
- Parent Process ID (PPID) spoofing
- Block DLL policy
- AMSI / ETW bypass
- Sleep and jitter configuration
Check commands documentation.