Evasive shellcode loader for bypassing event-based injection detection (PoC)
-
Updated
Aug 23, 2021 - C++
Evasive shellcode loader for bypassing event-based injection detection (PoC)
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
Open repository for learning dynamic shellcode loading (sample in many programming languages)
无可执行权限加载 ShellCode。Loading ShellCode without executable permission.
A library with four different methods to execute shellcode in a process
Execute shellcode from a remote server.
Akame is an open-source, UD shellcode loader written in C++17.
Injection Technique: Inserts current process into target process
A shellcode loader powered by a web panel.
simple shellcode injector for Windows / Process Hollowing
simple windows x64/x86 shellcode launcher
A PoC for dynamic analysis evasion.
Add a description, image, and links to the shellcode-loader topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-loader topic, visit your repo's landing page and select "manage topics."