https://github.com/vasco0x4/shellloader_hub
Shellcode Loader Library.
https://github.com/vasco0x4/shellloader_hub
av-bypass av-evasion dll-hijacking dll-hooking dll-injection indirect-syscall loader malware red-teaming redteam shellcode-loader
Last synced: 12 months ago
JSON representation
Shellcode Loader Library.
- Host: GitHub
- URL: https://github.com/vasco0x4/shellloader_hub
- Owner: Vasco0x4
- Created: 2024-11-21T09:03:57.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2025-01-08T20:50:42.000Z (about 1 year ago)
- Last Synced: 2025-03-24T14:34:55.512Z (about 1 year ago)
- Topics: av-bypass, av-evasion, dll-hijacking, dll-hooking, dll-injection, indirect-syscall, loader, malware, red-teaming, redteam, shellcode-loader
- Homepage:
- Size: 9.77 KB
- Stars: 9
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Shellcode Loader Hub
This repository collects interesting shellcode loaders for Red Team operations and security research.
| No. | Project URL | Description | Country |
|-----|----------------------------------------------------|-------------------------------------------------------------------------------------------------|---------|
| 1 | [JoJoLoader](https://github.com/Pizz33/JoJoLoader) | Helps Red Team members generate undetectable Trojans with one click, implemented in Rust (by_hyyrent). | 🇨🇳 CN |
| 2 | [S-inject](https://github.com/Joe1sn/S-inject) | A Windows injection tool for DLL+Shellcode evasion. Lists various methods and recommends pairing with other techniques for evasion flexibility. | 🇨🇳 CN |
| 3 | [RingQ](https://github.com/T4y1oR/RingQ) | One-click tool for evading detection and enabling CS, fscan, mimikatz, and more. | 🇨🇳 CN |
| 4 | [No_X_Memory_ShellCode_Loader](https://github.com/HackerCalico/No_X_Memory_ShellCode_Loader) | Loads ShellCode without executable permissions. Not directly for generating undetectable Trojans. | 🇺🇸 EN |
| 5 | [dataBrawl](https://github.com/Cherno-x/dataBrawl) | A framework for generating undetectable Trojans and shellcode. Maintenance paused during major events, core templates removed. | 🇨🇳CN |
| 6 | [GoBypassAV](https://github.com/A-little-dragon/GoBypassAV) | Evasion tool written in Go, supports automated random encryption and decryption. | 🇨🇳 CN |
| 7 | [ApexLdr](https://github.com/Cipher7/ApexLdr) | DLL payload loader developed in pure C. | 🇺🇸 EN |
| 8 | [BinarySpy](https://github.com/yj94/BinarySpy) | A tool to manually or automatically patch shellcode into binary files for evasion. | 🇨🇳 CN |
| 9 | [BinHol](https://github.com/timwhitez/BinHol) | Inserts malicious code into PE binaries using three different methods. | 🇨🇳 CN |
| 10 | [BypassA](https://github.com/yinsel/BypassA) | A post-exploitation evasion tool based on PE Patch technology, only supports x64. | 🇨🇳 CN |
| 11 | [go-bypass-loader](https://github.com/hhuang00/go-bypass-loader) | Shellcode loader for evasion implemented in Go. | 🇨🇳 CN |
| 12 | [PECracker](https://github.com/berryalen02/PECracker) | Evasion and countermeasure tool for PE file separation. | 🇨🇳 CN |
| 13 | [SilovLoader](https://github.com/example/SilovLoader) | A Rust-based loader designed for speed and minimal detection vectors. Popular in Russian research circles. | 🇨🇳 CN |
| 14 | [GhostPatch](https://github.com/example/GhostPatch) | A stealthy loader for shellcode leveraging advanced PE patching techniques. | 🇺🇸 EN |
| 15 | [HellBunny](https://github.com/voidvxvt/HellBunny) |Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks | 🇺🇸 EN |
| 16 | [RWX_MEMEORY_HUNT_AND_INJECTION_DV](https://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV) | Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. | 🇺🇸 EN |
| 17 | [C_Sep_Loader](https://github.com/1K0ng/C_Sep_Loader) | 一个简单的远程分离的加载器,免杀国内大部分杀软(360 火绒 Windows Defender 金山毒霸 电脑管家) | 🇨🇳 CN |
---