https://github.com/leoloobeek/COMRunner
A simple COM server which provides a component to run shellcode. Also includes a Windows JScript file to load the COM server and create the object with registration-free activation. This PoC COM server provides an object with a method that takes in base64 encoded shellcode and a method to run the shellcode.
#tools #opensource #shellcode
@securation
A simple COM server which provides a component to run shellcode. Also includes a Windows JScript file to load the COM server and create the object with registration-free activation. This PoC COM server provides an object with a method that takes in base64 encoded shellcode and a method to run the shellcode.
#tools #opensource #shellcode
@securation
GitHub
GitHub - leoloobeek/COMRunner: A simple COM server which provides a component to run shellcode
A simple COM server which provides a component to run shellcode - leoloobeek/COMRunner
⭕️ An in-memory evasion technique fluctuating shellcode memory protection between RW & RX and encrypting/decrypting contents
https://github.com/mgeeky/ShellcodeFluctuation
#evasion #inject #shellcode #bypass #av #edr
@securation
https://github.com/mgeeky/ShellcodeFluctuation
#evasion #inject #shellcode #bypass #av #edr
@securation
GitHub
GitHub - mgeeky/ShellcodeFluctuation: An advanced in-memory evasion technique fluctuating shellcode's memory protection between…
An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents - mgeeky/ShellcodeFluctuation
⭕️ New technique for shellcode injection to evade AVs and EDRs
https://github.com/Idov31/FunctionStomping
#bypass #edr #shellcode
@securation
https://github.com/Idov31/FunctionStomping
#bypass #edr #shellcode
@securation
👍4👎1
⭕️ SysWhispers Shellcode Loader
- Compiles raw shellcode and compile a C++ stub
that has been integrated with SysWhispers in order to bypass AV/EDR.
The included python builder will work on any Linux system that has Mingw-w64 installed.
- 5 different ways to execute your shellcode
https://github.com/icyguider/Shhhloader
#loader #bypass #av #edr #windows #shellcode
@securation
- Compiles raw shellcode and compile a C++ stub
that has been integrated with SysWhispers in order to bypass AV/EDR.
The included python builder will work on any Linux system that has Mingw-w64 installed.
- 5 different ways to execute your shellcode
https://github.com/icyguider/Shhhloader
#loader #bypass #av #edr #windows #shellcode
@securation
GitHub
GitHub - icyguider/Shhhloader: Syscall Shellcode Loader (Work in Progress)
Syscall Shellcode Loader (Work in Progress). Contribute to icyguider/Shhhloader development by creating an account on GitHub.
👍3
⭕️
#shellcode #bypass #edr #av
@securation
New technique for shellcode injection to evade AVs and EDRs
https://github.com/Idov31/FunctionStomping#shellcode #bypass #edr #av
@securation
GitHub
GitHub - Idov31/FunctionStomping: Shellcode injection technique. Given as C++ header, standalone Rust program or library.
Shellcode injection technique. Given as C++ header, standalone Rust program or library. - Idov31/FunctionStomping