VirtualAlllocEx / WinMalDev

Various methods of executing shellcode

Repository from Github https://github.comVirtualAlllocEx/WinMalDevRepository from Github https://github.comVirtualAlllocEx/WinMalDev

WinMalDev

Various methods of executing shellcode

All shellcodes in the example code are messagebox with the exception of the one used in the FunctionCast and ReflectiveLoader sample. These spawn a calc.exe process.

Thanks to -

  • @0xBoku
  • @Sektor7net
  • @kkent030315
  • @Steven Fewer
  • @spotheplanet
  • @reenz0h
  • @shaddy43

Disclaimer

Only for educational purposes. Owner of the repository does not take responsibility of the usage of the code contained here.

About

Various methods of executing shellcode


Languages

Language:C 66.7%Language:C++ 24.5%Language:C# 8.5%Language:Python 0.3%