ShellcodeFluctuation
Memory evasion technique
An advanced in-memory evasion technique for hiding malicious code from scanners by fluctuating shellcode's memory protection and encrypting its contents.
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
957 stars
19 watching
158 forks
Language: C++
last commit: over 2 years ago Related projects:
Repository | Description | Stars |
---|---|---|
mgeeky/threadstackspoofer | An advanced in-memory evasion technique to hide injected shellcode's memory allocation from scanners and analysts. | 1,053 |
mgeeky/redwarden | A tool to evade detection by security systems and incident responders by manipulating HTTP requests | 933 |
kyleavery/aceldr | A Cobalt Strike memory scanner evasion technique using code obfuscation and encryption to evade detection. | 887 |
joshfaust/alaris | A low-level shellcode loader that defeats modern EDR systems by utilizing various evasion techniques and encryption. | 891 |
epi052/rustdsplit | Re-implements a method to bypass signature-based AV detection by splitting a file into two halves and modifying one byte in each half to evade detection. | 35 |
zha0gongz1/desertfox | A Go-based tool for loading and executing malicious shellcode while evading anti-virus detection | 125 |
arvanaghi/checkplease | A collection of sandbox evasion modules written in various programming languages. | 904 |
phackt/stager.dll | A tool that embeds known payloads to evade detection by Windows Defender | 170 |
apehex/web3-evasion-techniques | A comprehensive repository detailing web3 evasion techniques and their application in malware detection. | 4 |
rkervella/carbonmonoxide | A toolkit for evading endpoint detection and response (EDR) by combining techniques to spoof system properties and inject malicious code. | 24 |
mgeeky/stracciatella | A tool to bypass security features in PowerShell and create an unmanaged environment for executing malicious code | 509 |
mgeeky/elusivemice | A custom reflective loader designed to evade detection and provide stealth capabilities in Cobalt Strike | 427 |
0xsp-srd/mortar | A toolset designed to evade detection by security products and execute malware safely | 1,421 |
govolution/avet | An AntiVirus Evasion Tool allowing developers to experiment with and create various evasion techniques for Windows executable files | 1,660 |
navytitanium/fake-sandbox-artifacts | Creates artificial artifacts to evade malware detection and analysis | 252 |