shellcode loader that uses indirect syscalls written in D Lang The loader bypasses user-mode hooks by resolving system calls manually from NTDLL using a hash-based method.
Repository from Github https://github.comEvilBytecode/EByte-Shellcode-LoaderRepository from Github https://github.comEvilBytecode/EByte-Shellcode-Loader