Showing how proof-of-work can be used to evade antivirus emulators.
EmulateMe uses a proof-of-work algorithm also used by Bitcoin, known as Hashcash, to compute arbitrary data at runtime.
This process is CPU expensive and can vary in intensity depending on the bitstring difficulty.
I'm sure there are some less than ideal coding choices here, so please contribute your suggestions.
Example usage in Program.cs focuses around encrypting state variables, but you can really apply this technique as you see fit. It will transform whatever byte array you choose (shellcode, decryption key, etc.) into C# code which will build the buffer at runtime with encryption/decryption keys based on the HashCash PoW algorithm.
https://winternl.com/designing-emulation-resistant-control-flow/
Additional Reading:
https://www.crestcon.org/wp-content/uploads/2019/11/MattWixey.pdf