EvilBytecode / Shellcode-LoaderLinks
This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.
☆75Updated 3 months ago
Alternatives and similar repositories for Shellcode-Loader
Users that are interested in Shellcode-Loader are comparing it to the libraries listed below
Sorting:
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆113Updated 7 months ago
- Construct the payload at runtime using an array of offsets☆63Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆149Updated last week
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆171Updated 4 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆95Updated 3 months ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆97Updated last year
- Adversary Emulation Framework☆121Updated last month
- 「💀」Proof of concept on BYOVD attack☆161Updated 8 months ago
- PowerShell script to generate ShellCode in various formats☆42Updated 10 months ago
- Chrome browser extension-based Command & Control☆157Updated last month
- A Mythic agent for Windows written in C☆131Updated 2 weeks ago
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆39Updated 8 months ago
- ☆155Updated 7 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆134Updated this week
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆189Updated 8 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆152Updated 2 months ago
- Command and Control (C2) framework☆128Updated 2 months ago
- A repository holding Proof of Concepts for executing the calculator application via different file formats☆39Updated last year
- Ghosting-AMSI☆207Updated 3 months ago
- Automated .NET AppDomain hijack payload generation☆127Updated 6 months ago
- Stage 0☆163Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Example code samples from our ScriptBlock Smuggling Blog post☆91Updated last year
- ☆189Updated last year
- Encodes a payload within a generated mock-CSS file☆58Updated last year
- A small How-To on creating your own weaponized WSL file☆83Updated 2 weeks ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆71Updated last month