DripLoader
pe_to_shellcode
DripLoader | pe_to_shellcode | |
---|---|---|
6 | 4 | |
666 | 2,202 | |
- | - | |
1.8 | 3.8 | |
over 2 years ago | 9 months ago | |
C++ | C++ | |
MIT License | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DripLoader
- Bypassing EDR real-time injection detection logic
- Does anyone know any good x64 shellcode loaders?
- DripLoader: Evasive shellcode loader for bypassing event-based injection detection
- DripLoader - Evasive shellcode loader for bypassing event-based injection detection
- DripLoader: Evasive shellcode loader for bypassing event-based injection detection, without necessarily suppressing event collection - aiming to highlight limitations of event-driven injection identification, and show the need for more advanced memory scanning/smarter local agent inventories in EDR
pe_to_shellcode
-
Bypassing Windows Defender (10 Ways)
Finally, we also have the option to transform a native PE back to shellcode. This may be done, for example, via hasherezade's pe_to_shellcode tool.
- Petoshellcode - Converts PE into a shellcode
- pe_to_shellcode: Converts PE so that it can be then injected just like a normal shellcode. (At the same time, the output file remains to be a valid PE). Supports both 32 and 64 bit PEs
- Petoshellcode – Converts PE into a Shellcode
What are some alternatives?
MicroBackdoor - Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]
dll_to_exe - Converts a DLL into EXE
donut - Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
pypackerdetect - Packing detection tool for PE files
TelemetrySourcerer - Enumerate and disable common sources of telemetry used by AV/EDR.
CSharpReflectionWorkshop - The repository that complements the From zero to hero: creating a reflective loader in C# workshop
pwntools - CTF framework and exploit development library
donut - Official Implementation of OCR-free Document Understanding Transformer (Donut) and Synthetic Document Generator (SynthDoG), ECCV 2022
Alcatraz - x64 binary obfuscator
Create-Thread-Shellcode-Fetcher - This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.
LsaParser - A shitty (and old) lsass parser.