🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Exe-To-Batch-Convert
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 17:02:12
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Exe-To-Batch-Convert
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 17:02:12
📝 项目描述:
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.🔗 点击访问项目地址
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 21:01:36
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 21:01:36
📝 项目描述:
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.🔗 点击访问项目地址
GitHub
GitHub - Dreawma/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable: Malware builders create hidden trojans with…
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth....
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Loader #Bypass #Shellcode
📦 项目名称: Exe-To-Base64-ShellCode-Convert
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-19 07:02:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Loader #Bypass #Shellcode
📦 项目名称: Exe-To-Base64-ShellCode-Convert
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-19 07:02:57
📝 项目描述:
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.🔗 点击访问项目地址
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: shelly-rs
👤 项目作者: HeiTimo
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-20 18:50:44
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: shelly-rs
👤 项目作者: HeiTimo
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-20 18:50:44
📝 项目描述:
a project for a simple shellcode loader with evasive capabilities in rust🔗 点击访问项目地址
GitHub
HeiTimo/shelly-rs
a project for a simple shellcode loader with evasive capabilities in rust - HeiTimo/shelly-rs
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: ShadeShell
👤 项目作者: Artunesa5430
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-23 01:02:35
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: ShadeShell
👤 项目作者: Artunesa5430
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-23 01:02:35
📝 项目描述:
Encrypt, obfuscate, and encode Windows shellcode for loader use with ShadeShell, a C tool for red team payload prep🔗 点击访问项目地址
GitHub
GitHub - Artunesa5430/ShadeShell: Encrypt, obfuscate, and encode Windows shellcode for loader use with ShadeShell, a C tool for…
Encrypt, obfuscate, and encode Windows shellcode for loader use with ShadeShell, a C tool for red team payload prep - Artunesa5430/ShadeShell
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Loaders-and-Evasion
👤 项目作者: MTA-tools
🛠 开发语言: C#
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-23 21:02:05
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Loaders-and-Evasion
👤 项目作者: MTA-tools
🛠 开发语言: C#
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-23 21:02:05
📝 项目描述:
A collection of tools that help solve the malware author's problem: executing shellcode undetected.🔗 点击访问项目地址
GitHub
GitHub - MTA-tools/Loaders-and-Evasion: A collection of tools that help solve the malware author's problem: executing shellcode…
A collection of tools that help solve the malware author's problem: executing shellcode undetected. - MTA-tools/Loaders-and-Evasion
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: syscall-watchdog
👤 项目作者: 0x-xnum
🛠 开发语言: C
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-24 12:01:50
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: syscall-watchdog
👤 项目作者: 0x-xnum
🛠 开发语言: C
⭐ Star数量: 2 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-24 12:01:50
📝 项目描述:
Linux syscall-level intrusion detection system using ptrace. Monitors processes in real time and alerts on suspicious behaviour including privilege escalation, shellcode injection, fork bombs, and sensitive file access.🔗 点击访问项目地址
GitHub
GitHub - 0x-xnum/syscall-watchdog: Linux syscall-level intrusion detection system using ptrace. Monitors processes in real time…
Linux syscall-level intrusion detection system using ptrace. Monitors processes in real time and alerts on suspicious behaviour including privilege escalation, shellcode injection, fork bombs, and ...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: VisualSploit
👤 项目作者: Meltedd
🛠 开发语言: C#
⭐ Star数量: 8 | 🍴 Fork数量: 1
📅 更新时间: 2026-04-25 02:48:19
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject #Execute
📦 项目名称: VisualSploit
👤 项目作者: Meltedd
🛠 开发语言: C#
⭐ Star数量: 8 | 🍴 Fork数量: 1
📅 更新时间: 2026-04-25 02:48:19
📝 项目描述:
Backdoor Visual Studio project files with custom shellcode, which executes whenever the project is opened or built.🔗 点击访问项目地址
GitHub
GitHub - Meltedd/VisualSploit: Backdoor Visual Studio project files with custom shellcode, which executes whenever the project…
Backdoor Visual Studio project files with custom shellcode, which executes whenever the project is opened or built. - Meltedd/VisualSploit
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: omni
👤 项目作者: annihilatorq
🛠 开发语言: C++
⭐ Star数量: 235 | 🍴 Fork数量: 22
📅 更新时间: 2026-04-26 14:58:40
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: omni
👤 项目作者: annihilatorq
🛠 开发语言: C++
⭐ Star数量: 235 | 🍴 Fork数量: 22
📅 更新时间: 2026-04-26 14:58:40
📝 项目描述:
A modern zero-allocation C++23 library for working with low-level Windows within user-space. Iteration over loaded modules via PEB, EAT iteration, lazy imports, syscalls, and more.🔗 点击访问项目地址
GitHub
GitHub - annihilatorq/omni: windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and…
windows syscalls with a single line and a high level of abstraction. has modern cpp20 wrappers and utilities, range-based DLL and export enumeration, wrapper around KUSER_SHARED_DATA. supported com...