🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader #Inject
📦 项目名称: Evasion-SubAgents
👤 项目作者: isra-osvaldo
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-01 10:01:28
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader #Inject
📦 项目名称: Evasion-SubAgents
👤 项目作者: isra-osvaldo
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-01 10:01:28
📝 项目描述:
Develop tools to research, generate, and integrate evasion techniques into shellcode loaders for improved stealth against detection systems.🔗 点击访问项目地址
GitHub
GitHub - isra-osvaldo/Evasion-SubAgents: Develop tools to research, generate, and integrate evasion techniques into shellcode loaders…
Develop tools to research, generate, and integrate evasion techniques into shellcode loaders for improved stealth against detection systems. - isra-osvaldo/Evasion-SubAgents
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: pe-sieve
👤 项目作者: hasherezade
🛠 开发语言: C++
⭐ Star数量: 3597 | 🍴 Fork数量: 469
📅 更新时间: 2026-04-01 18:02:33
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: pe-sieve
👤 项目作者: hasherezade
🛠 开发语言: C++
⭐ Star数量: 3597 | 🍴 Fork数量: 469
📅 更新时间: 2026-04-01 18:02:33
📝 项目描述:
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches).🔗 点击访问项目地址
GitHub
GitHub - hasherezade/pe-sieve: Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected…
Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches). - hasherezade/pe-sieve
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: CTFPacker
👤 项目作者: mochabyte0x
🛠 开发语言: C
⭐ Star数量: 120 | 🍴 Fork数量: 22
📅 更新时间: 2026-04-02 13:58:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: CTFPacker
👤 项目作者: mochabyte0x
🛠 开发语言: C
⭐ Star数量: 120 | 🍴 Fork数量: 22
📅 更新时间: 2026-04-02 13:58:18
📝 项目描述:
Shellcode packer for CTFs and pentest / red team exams aiming for AV evasion!🔗 点击访问项目地址
GitHub
GitHub - mochabyte0x/CTFPacker: Shellcode packer for CTFs and pentest / red team exams aiming for AV evasion!
Shellcode packer for CTFs and pentest / red team exams aiming for AV evasion! - mochabyte0x/CTFPacker
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: x96-combiner
👤 项目作者: RTS-Framework
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-02 15:58:43
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: x96-combiner
👤 项目作者: RTS-Framework
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-02 15:58:43
📝 项目描述:
A tool for building multi-architecture (x86/x64) shellcode that can execute correctly on both platforms.🔗 点击访问项目地址
GitHub
GitHub - RTS-Framework/x96-combiner: A tool for building multi-architecture (x86/x64) shellcode that can execute correctly on both…
A tool for building multi-architecture (x86/x64) shellcode that can execute correctly on both platforms. - RTS-Framework/x96-combiner
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader #Inject
📦 项目名称: WindowsShell-Injector-Shellcode-Loader
👤 项目作者: Drawmwm
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-02 18:53:35
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader #Inject
📦 项目名称: WindowsShell-Injector-Shellcode-Loader
👤 项目作者: Drawmwm
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-02 18:53:35
📝 项目描述:
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing.🔗 点击访问项目地址
GitHub
GitHub - Drawmwm/WindowsShell-Injector-Shellcode-Loader: An advanced Windows shell code loader and generator toolset featuring…
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing. - Drawmwm/WindowsShell-Injector-Shellcode-Loader
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: MemoryExec-Shellcode
👤 项目作者: Rawmwk
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-03 00:02:18
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: MemoryExec-Shellcode
👤 项目作者: Rawmwk
🛠 开发语言: C++
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-03 00:02:18
📝 项目描述:
Windows tool for encrypting and loading shellcode in memory for security research and controlled testing. Supports in‑memory execution, payload encryption, and Windows API techniques. Topics: shellcode-loader, encryption, in-memory-execution, payload-encryption, windows-api, security-research, penetration-testing, windows-security🔗 点击访问项目地址
GitHub
GitHub - Rawmwk/MemoryExec-Shellcode: Windows tool for encrypting and loading shellcode in memory for security research and controlled…
Windows tool for encrypting and loading shellcode in memory for security research and controlled testing. Supports in‑memory execution, payload encryption, and Windows API techniques. Topics: shell...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: instrumentation-callback-injection
👤 项目作者: 000nico
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-06 01:46:03
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: instrumentation-callback-injection
👤 项目作者: 000nico
🛠 开发语言: C++
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-06 01:46:03
📝 项目描述:
Inject shell code with _PROCESS_INSTRUMENTATION_CALLBACK_INFORMATION using NtSetInformationProcess🔗 点击访问项目地址
GitHub
GitHub - 000nico/instrumentation-callback-injection: Inject shell code with _PROCESS_INSTRUMENTATION_CALLBACK_INFORMATION using…
Inject shell code with _PROCESS_INSTRUMENTATION_CALLBACK_INFORMATION using NtSetInformationProcess - 000nico/instrumentation-callback-injection
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: maldev
👤 项目作者: oioio-space
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-04-07 06:02:43
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: maldev
👤 项目作者: oioio-space
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 1
📅 更新时间: 2026-04-07 06:02:43
📝 项目描述:
Modular malware development library in Go - shellcode injection, defense evasion (AMSI/ETW/unhook), process herpaderping, C2 transport, syscall bypass, MITRE ATT&CK mapped🔗 点击访问项目地址
GitHub
GitHub - oioio-space/maldev: Modular malware development library in Go - shellcode injection, defense evasion (AMSI/ETW/unhook)…
Modular malware development library in Go - shellcode injection, defense evasion (AMSI/ETW/unhook), process herpaderping, C2 transport, syscall bypass, MITRE ATT&CK mapped - oioio-space/maldev
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: Ada-Execute-PIC
👤 项目作者: JohnRyk
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-09 01:59:53
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Execute
📦 项目名称: Ada-Execute-PIC
👤 项目作者: JohnRyk
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-09 01:59:53
📝 项目描述:
AdaptixC2 extension kit for inline execute PIC shellcode prove of concept🔗 点击访问项目地址
GitHub
JohnRyk/Ada-Execute-PIC
AdaptixC2 extension kit for inline execute PIC shellcode prove of concept - JohnRyk/Ada-Execute-PIC
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: PE-Injector
👤 项目作者: RTS-Framework
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-09 15:59:58
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: PE-Injector
👤 项目作者: RTS-Framework
🛠 开发语言: Go
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-09 15:59:58
📝 项目描述:
An injector for injecting shellcode into PE image files.🔗 点击访问项目地址
GitHub
GitHub - RTS-Framework/PE-Injector: An injector for injecting shellcode into PE image files.
An injector for injecting shellcode into PE image files. - RTS-Framework/PE-Injector
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: keyboard-poisoning
👤 项目作者: rubiotelmo0
🛠 开发语言: Assembly
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-11 16:01:25
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: keyboard-poisoning
👤 项目作者: rubiotelmo0
🛠 开发语言: Assembly
⭐ Star数量: 1 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-11 16:01:25
📝 项目描述:
Didactic ARM32 shellcode project for studying how a keyboard configuration poisoning payload can be built, injected, and debugged in a controlled Raspbian lab.🔗 点击访问项目地址
GitHub
GitHub - rubiotelmo0/keyboard-poisoning: Didactic ARM32 shellcode project for studying how a keyboard configuration poisoning payload…
Didactic ARM32 shellcode project for studying how a keyboard configuration poisoning payload can be built, injected, and debugged in a controlled Raspbian lab. - rubiotelmo0/keyboard-poisoning
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: gatex
👤 项目作者: erenhazexyz2
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-13 15:02:31
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: gatex
👤 项目作者: erenhazexyz2
🛠 开发语言: Python
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-13 15:02:31
📝 项目描述:
Polymorphic Shellcode loader Generator for x64 Windows🔗 点击访问项目地址
GitHub
GitHub - erenhazexyz2/gatex: polymorphic shellcode loader generator for x64 windows
polymorphic shellcode loader generator for x64 windows - erenhazexyz2/gatex
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Injex
👤 项目作者: erenhazexyz2
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-13 15:59:47
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: Injex
👤 项目作者: erenhazexyz2
🛠 开发语言: C
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-13 15:59:47
📝 项目描述:
single header process injection library🔗 点击访问项目地址
GitHub
GitHub - erenhazexyz2/Injex: single header process injection library
single header process injection library. Contribute to erenhazexyz2/Injex development by creating an account on GitHub.
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Lucky-Spark
👤 项目作者: Schich
🛠 开发语言: C
⭐ Star数量: 34 | 🍴 Fork数量: 5
📅 更新时间: 2026-04-16 14:56:10
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Lucky-Spark
👤 项目作者: Schich
🛠 开发语言: C
⭐ Star数量: 34 | 🍴 Fork数量: 5
📅 更新时间: 2026-04-16 14:56:10
📝 项目描述:
A stealthy loader for shellcode staged with http/https like Sliver🔗 点击访问项目地址
GitHub
GitHub - Schich/Lucky-Spark: A stealthy loader for shellcode staged with http/https like Sliver
A stealthy loader for shellcode staged with http/https like Sliver - Schich/Lucky-Spark
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: processInjection
👤 项目作者: vKwamboka57
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-17 06:58:17
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Inject
📦 项目名称: processInjection
👤 项目作者: vKwamboka57
🛠 开发语言: None
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-17 06:58:17
📝 项目描述:
Simple shellcode to be injected to a process in win32api🔗 点击访问项目地址
GitHub
vKwamboka57/processInjection
Simple shellcode to be injected to a process in win32api - vKwamboka57/processInjection
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 12:57:34
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Phantom-Dropper-WebBased-Chrome-Bypas-Fud-Runtime-Native
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 12:57:34
📝 项目描述:
Trojan builders focus on creating hidden malware with downloader and encryption capabilities. Assembly changers and mutex features ensure uniqueness, while RAT clients provide remote access to infected systems.🔗 点击访问项目地址
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Exe-To-Batch-Convert
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 17:02:12
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Exe-To-Batch-Convert
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 17:02:12
📝 项目描述:
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payloads are fetched securely.🔗 点击访问项目地址
GitHub
GitHub - Dreawma/Exe-To-Batch-Convert: RAT tools and malware builders generate trojan clients with hidden startup and encryption.…
RAT tools and malware builders generate trojan clients with hidden startup and encryption. Features like assembly changers and mutex improve stealth, while downloader modules ensure additional payl...
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 21:01:36
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-18 21:01:36
📝 项目描述:
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth.🔗 点击访问项目地址
GitHub
GitHub - Dreawma/Exe-UacBypass-Downloader-Crypter-Fud-Defender-Malware-Executable: Malware builders create hidden trojans with…
Malware builders create hidden trojans with features like UAC bypass and defender bypass. Tools like crypters and FUD ensure antivirus evasion, while shellcode and memory exclusion enhance stealth....
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Loader #Bypass #Shellcode
📦 项目名称: Exe-To-Base64-ShellCode-Convert
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-19 07:02:57
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Loader #Bypass #Shellcode
📦 项目名称: Exe-To-Base64-ShellCode-Convert
👤 项目作者: Dreawma
🛠 开发语言: Visual Basic .NET
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-19 07:02:57
📝 项目描述:
Hidden malware uses techniques like UAC bypass and antivirus bypass to avoid detection. Crypters and shellcode loaders help deploy FUD payloads, while memory exclusion ensures smooth execution without interference.🔗 点击访问项目地址
🚨 GitHub 监控消息提醒
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: shelly-rs
👤 项目作者: HeiTimo
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-20 18:50:44
📝 项目描述:
🔗 点击访问项目地址
🚨 发现关键词: #Shellcode #Loader
📦 项目名称: shelly-rs
👤 项目作者: HeiTimo
🛠 开发语言: Rust
⭐ Star数量: 0 | 🍴 Fork数量: 0
📅 更新时间: 2026-04-20 18:50:44
📝 项目描述:
a project for a simple shellcode loader with evasive capabilities in rust🔗 点击访问项目地址
GitHub
HeiTimo/shelly-rs
a project for a simple shellcode loader with evasive capabilities in rust - HeiTimo/shelly-rs