An open API service indexing awesome lists of open source software.

https://github.com/vasco0x4/shellloader_hub

Shellcode Loader Library.
https://github.com/vasco0x4/shellloader_hub

av-bypass av-evasion dll-hijacking dll-hooking dll-injection indirect-syscall loader malware red-teaming redteam shellcode-loader

Last synced: 12 months ago
JSON representation

Shellcode Loader Library.

Awesome Lists containing this project

README

          

# Shellcode Loader Hub

This repository collects interesting shellcode loaders for Red Team operations and security research.

| No. | Project URL | Description | Country |
|-----|----------------------------------------------------|-------------------------------------------------------------------------------------------------|---------|
| 1 | [JoJoLoader](https://github.com/Pizz33/JoJoLoader) | Helps Red Team members generate undetectable Trojans with one click, implemented in Rust (by_hyyrent). | 🇨🇳 CN |
| 2 | [S-inject](https://github.com/Joe1sn/S-inject) | A Windows injection tool for DLL+Shellcode evasion. Lists various methods and recommends pairing with other techniques for evasion flexibility. | 🇨🇳 CN |
| 3 | [RingQ](https://github.com/T4y1oR/RingQ) | One-click tool for evading detection and enabling CS, fscan, mimikatz, and more. | 🇨🇳 CN |
| 4 | [No_X_Memory_ShellCode_Loader](https://github.com/HackerCalico/No_X_Memory_ShellCode_Loader) | Loads ShellCode without executable permissions. Not directly for generating undetectable Trojans. | 🇺🇸 EN |
| 5 | [dataBrawl](https://github.com/Cherno-x/dataBrawl) | A framework for generating undetectable Trojans and shellcode. Maintenance paused during major events, core templates removed. | 🇨🇳CN |
| 6 | [GoBypassAV](https://github.com/A-little-dragon/GoBypassAV) | Evasion tool written in Go, supports automated random encryption and decryption. | 🇨🇳 CN |
| 7 | [ApexLdr](https://github.com/Cipher7/ApexLdr) | DLL payload loader developed in pure C. | 🇺🇸 EN |
| 8 | [BinarySpy](https://github.com/yj94/BinarySpy) | A tool to manually or automatically patch shellcode into binary files for evasion. | 🇨🇳 CN |
| 9 | [BinHol](https://github.com/timwhitez/BinHol) | Inserts malicious code into PE binaries using three different methods. | 🇨🇳 CN |
| 10 | [BypassA](https://github.com/yinsel/BypassA) | A post-exploitation evasion tool based on PE Patch technology, only supports x64. | 🇨🇳 CN |
| 11 | [go-bypass-loader](https://github.com/hhuang00/go-bypass-loader) | Shellcode loader for evasion implemented in Go. | 🇨🇳 CN |
| 12 | [PECracker](https://github.com/berryalen02/PECracker) | Evasion and countermeasure tool for PE file separation. | 🇨🇳 CN |
| 13 | [SilovLoader](https://github.com/example/SilovLoader) | A Rust-based loader designed for speed and minimal detection vectors. Popular in Russian research circles. | 🇨🇳 CN |
| 14 | [GhostPatch](https://github.com/example/GhostPatch) | A stealthy loader for shellcode leveraging advanced PE patching techniques. | 🇺🇸 EN |
| 15 | [HellBunny](https://github.com/voidvxvt/HellBunny) |Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks | 🇺🇸 EN |
| 16 | [RWX_MEMEORY_HUNT_AND_INJECTION_DV](https://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV) | Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. | 🇺🇸 EN |
| 17 | [C_Sep_Loader](https://github.com/1K0ng/C_Sep_Loader) | 一个简单的远程分离的加载器,免杀国内大部分杀软(360 火绒 Windows Defender 金山毒霸 电脑管家) | 🇨🇳 CN |

---