Injection Technique: Inserts current process into target process
-
Updated
May 16, 2024 - C++
Injection Technique: Inserts current process into target process
simple windows x64/x86 shellcode launcher
ARM64 macOS assembly program for null-byte free shellcode
助力每一位RT队员,快速生成免杀木马
Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤
Open repository for learning dynamic shellcode loading (sample in many programming languages)
A protective and Low Level Shellcode Loader that defeats modern EDR systems.
Execute Win x64 and x86-32 shellcode
Process Hallowing with UAC Bypass
A shellcode loader powered by a web panel.
Various dll hollowing techniques
Fileless Shellcode Loader with Python
just a Python Shellcode loader
The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls
Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".
免杀,bypassav,免杀框架,nim,shellcode,使用nim编写的shellcode加载器
Running Shellcode using Rust
Add a description, image, and links to the shellcode-loader topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-loader topic, visit your repo's landing page and select "manage topics."