This directory contains inert test binaries used for CrowdStrike Falcon detection testing.
- build_samples.py - Generates obfuscated, self-decrypting ELF binaries (no libc, raw syscalls)
- sample-<arch> - Compiled binary for the given architecture (e.g.,
sample-aarch64,sample-x86_64)
The sample binaries are inert test tools that:
- Attempt to create a TCP connection to 192.168.0.1 on port 4444
- Are designed to trigger CrowdStrike Falcon's on-sensor machine learning detection
- Do NOT contain any actual malicious code or payloads
- Exit immediately (either blocked by Falcon or due to connection failure)
Build self-decrypting ELF binaries for all supported architectures (aarch64, x86):
./build_samples.pyThese binaries use raw syscalls, XOR self-decryption, and a minimal ELF layout (single RWE segment, no sections) to trigger ML-based detection. Build specific architectures with:
./build_samples.py --arch aarch64
./build_samples.py --arch aarch64 --arch x86
./build_samples.py --outdir ../../bin/evil/These are legitimate security testing tools used by CrowdStrike for detection validation. They are not actual malware and contain no harmful code.