Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
-
Updated
Dec 22, 2024 - C
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Advanced memory evasion PoC that cyclically encrypts shellcode and fluctuates between RW/NoAccess and RX memory protections to bypass memory scanners like Moneta and PE-Sieve.
MQTT client with End-to-End Payload Encryption for Embedded Linux
CipherPayload middleware for Fiber that use AES Algorithm for encrypt and decrypt payload in request and response body.
🔐 Load and execute XOR-encrypted shellcode on Windows with this efficient C++ and Python utility for enhanced security and customization.
Encryption tool for Windows to load encrypted shell code. Tool for developing malicious software and in-memory execution.
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing.
Advanced Windows shellcode development framework with position-independent code generation, dynamic API resolution, and cross-architecture support for security research and penetration testing.
🛠️ Execute encrypted shellcode effortlessly with this Windows framework, featuring anti-debugging and a user-friendly Qt interface for secure research.
Add a description, image, and links to the payload-encryption topic page so that developers can more easily learn about it.
To associate your repository with the payload-encryption topic, visit your repo's landing page and select "manage topics."