You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Este projeto é uma implementação da técnica de evasão conhecida como Process Doppelganging. Esta técnica permite a execução de um binário malicioso (payload) sob o disfarce de um processo legítimo ou de um arquivo inexistente no disco, dificultando a detecção por soluções de segurança em geral.
This project contains methodology of creating position independent code that is used to extract shellcode from the generated binary. Position independent shellcode could be injected in any process for evading defenses and creating backdoors.
This repo gives you an injector that bypasses static and dynamic analysis. The shellcodes that are injected must be encrypted with a key and decrypted at runtime to avoid detection.