DripLoader VS pe_to_shellcode

Compare DripLoader vs pe_to_shellcode and see what are their differences.


Evasive shellcode loader for bypassing event-based injection detection (PoC) (by xuanxuan0)
Our great sponsors
DripLoader pe_to_shellcode
6 4
666 2,125
- -
1.8 3.8
over 2 years ago 7 months ago
C++ C++
MIT License BSD 2-clause "Simplified" License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.


Posts with mentions or reviews of DripLoader. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-08-18.


Posts with mentions or reviews of pe_to_shellcode. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-08-27.
  • Bypassing Windows Defender (10 Ways)
    15 projects | dev.to | 27 Aug 2023
    Finally, we also have the option to transform a native PE back to shellcode. This may be done, for example, via hasherezade's pe_to_shellcode tool.

What are some alternatives?

When comparing DripLoader and pe_to_shellcode you can also consider the following projects:

MicroBackdoor - Small and convenient C2 tool for Windows targets. [ Русский -- значит нахуй! ]

donut - Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters

TelemetrySourcerer - Enumerate and disable common sources of telemetry used by AV/EDR.

CSharpReflectionWorkshop - The repository that complements the From zero to hero: creating a reflective loader in C# workshop

dll_to_exe - Converts a DLL into EXE

donut - Official Implementation of OCR-free Document Understanding Transformer (Donut) and Synthetic Document Generator (SynthDoG), ECCV 2022

Create-Thread-Shellcode-Fetcher - This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and download and execute your C2-shellcode which is hosted on your (C2)-webserver.

Huan - Encrypted PE Loader Generator

pypackerdetect - Packing detection tool for PE files

pwntools - CTF framework and exploit development library

BLUESPAWN - An Active Defense and EDR software to empower Blue Teams

iMonitorSDK - 系统监控开发套件(sysmon、promon、edr、终端安全、主机安全、零信任、上网行为管理)