There are 44 repositories under shellcode-loader topic.
shellcode免杀加载器,使用go实现,免杀bypass火绒、360、核晶、def等主流杀软
Evasive shellcode loader for bypassing event-based injection detection (PoC)
助力每一位RT队员,快速生成免杀木马
MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密
windows-rs shellcode loaders
This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
Open repository for learning dynamic shellcode loading (sample in many programming languages)
Resources About Shellcode
nim,免杀,红队,shellcode,bypass,apt,bypass-av.
Java JNI HellsGate/HalosGate/TartarusGate/RecycledGate/SSN Syscall/Many Shellcode Loaders
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.
shellcode loader,bypassav,免杀,一款基于python的shellcode免杀加载器
🕶️ 隐蔽Shellcode嵌入与反检测免杀加载器生成框架 / Stealthy Payload Delivery Framework with Anti-EDR Capabilities
Implement load Cobalt Strike & Metasploit&Sliver shellcode with golang
ARM64 macOS assembly program for null-byte free shellcode
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks