Evasive shellcode loader for bypassing event-based injection detection (PoC)
-
Updated
Aug 23, 2021 - C++
Evasive shellcode loader for bypassing event-based injection detection (PoC)
Open repository for learning dynamic shellcode loading (sample in many programming languages)
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.
ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过
A library with four different methods to execute shellcode in a process
Akame is an open-source, shellcode loader written in C++17
simple shellcode injector for Windows / Process Hollowing
BypassETWDirectSyscallShellcodeLoader is a robust C++14 application designed for secure and stealthy shellcode execution. It incorporates advanced anti-debugging and anti-sandboxing techniques to evade detection and analysis, making it suitable for penetration testing and security research.
A shellcode loader powered by a web panel.
Execute shellcode from a remote server.
Injection Technique: Inserts current process into target process
Create a Shellcode Dropper from any Windows Module , using EarlyCascade injection technique and indirect syscall
simple windows x64/x86 shellcode launcher
Shellcode development involves creating payloads for post-exploitation tasks like antivirus evasion and UAC bypass. Tools like shellcode loaders and injectors enable execution, while assembly and encoders ensure stealth on Windows systems.
Add a description, image, and links to the shellcode-loader topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-loader topic, visit your repo's landing page and select "manage topics."