A PoC for dynamic analysis evasion.
-
Updated
Jun 14, 2024 - C++
A PoC for dynamic analysis evasion.
simple windows x64/x86 shellcode launcher
simple shellcode injector for Windows / Process Hollowing
Injection Technique: Inserts current process into target process
A shellcode loader powered by a web panel.
Execute shellcode from a remote server.
Akame is an open-source, UD shellcode loader written in C++17.
ShadeLoader is a simple remote shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过
A library with four different methods to execute shellcode in a process
Open repository for learning dynamic shellcode loading (sample in many programming languages)
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
无可执行权限加载 ShellCode。Loading ShellCode without executable permission.
Evasive shellcode loader for bypassing event-based injection detection (PoC)
Add a description, image, and links to the shellcode-loader topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-loader topic, visit your repo's landing page and select "manage topics."