Vasco0x4 / ShadeLoaderLinks
ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过
☆40Updated last month
Alternatives and similar repositories for ShadeLoader
Users that are interested in ShadeLoader are comparing it to the libraries listed below
Sorting:
- A Python-based VBScript Code Obfuscator☆39Updated 2 months ago
- Binary Hollowing☆76Updated 9 months ago
- ☆47Updated last year
- (EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.☆34Updated last month
- Self Cleanup in post-ex job☆56Updated 9 months ago
- ☆26Updated last year
- Evasive loader to bypass static detection☆58Updated last year
- vehsyscall:a syscall project that may bypass EDR☆58Updated last year
- Help red teams find opsec processes during engagements☆41Updated 6 months ago
- Amaterasu terminates, or inhibits, protected processes such as application control and AV/EDR solutions by leveraging the Sysinternals Pr…☆72Updated last year
- Silently Install Chrome Extension For Persistence☆88Updated 11 months ago
- Simulate per-process disconnection in red team environments☆45Updated 3 weeks ago
- shellcode生成框架☆87Updated 11 months ago
- beta☆116Updated 9 months ago
- A mutliple tactics to execute shellcode in go :}☆20Updated 2 months ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆56Updated 3 weeks ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆49Updated 2 years ago
- Remote Access Tool written in C#☆41Updated this week
- A Simple PoC☆21Updated last year
- Repository of scripts from my blog post on bypassing the YARA rule Windows_Trojan_CobaltStrike_f0b627fc by generating alternative shellco…☆41Updated 8 months ago
- An ICMP channel for Beacons, implemented using Cobalt Strike’s External C2 framework.☆83Updated this week
- more conveniently Visual-Studio-BOF-template☆65Updated last year
- CSharp reimplementation of Venoma, another C++ Cobalt Strike beacon dropper with custom indirect syscalls execution☆45Updated last year
- ☆96Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆53Updated last year
- A method to execute syscalls while bypassing EDR's function hooking and call stack analysis.☆14Updated 2 months ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆88Updated 2 years ago
- Shellcode Reductio Entropy Tools☆69Updated last year
- CobaltStrike4.5 Sleeve解密文件,搬砖加一点点修改, 仅作备份使用.☆31Updated 3 years ago
- ☆15Updated 11 months ago