Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
-
Updated
Dec 22, 2024 - C
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Advanced memory evasion PoC that cyclically encrypts shellcode and fluctuates between RW/NoAccess and RX memory protections to bypass memory scanners like Moneta and PE-Sieve.
MQTT client with End-to-End Payload Encryption for Embedded Linux
CipherPayload middleware for Fiber that use AES Algorithm for encrypt and decrypt payload in request and response body.
Encryption tool for Windows to load encrypted shell code. Tool for developing malicious software and in-memory execution.
🛠️ Execute encrypted shellcode effortlessly with this Windows framework, featuring anti-debugging and a user-friendly Qt interface for secure research.
🔐 Load and execute XOR-encrypted shellcode on Windows with this efficient C++ and Python utility for enhanced security and customization.
🛡️ Demonstrate advanced in-memory evasion techniques to encrypt and decrypt shellcode, enhancing security against memory scanners efficiently.
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing.
Advanced Windows shellcode development framework with position-independent code generation, dynamic API resolution, and cross-architecture support for security research and penetration testing.
Add a description, image, and links to the payload-encryption topic page so that developers can more easily learn about it.
To associate your repository with the payload-encryption topic, visit your repo's landing page and select "manage topics."