Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 4d57faa

Browse files
djnnvxbogdzn
andauthored
adding articles & tools used for myph development (matro7sh#8)
* adding articles & tools used for `myph` development * Auto-update the index.html * damn you, trackpad * Auto-update the index.html --------- Co-authored-by: bogdzn <[email protected]>
1 parent 72f15e9 commit 4d57faa

File tree

2 files changed

+17
-6
lines changed

2 files changed

+17
-6
lines changed

Bypass-AV.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,22 +70,31 @@ markmap:
7070
- <https://github.com/CMEPW/Selha/blob/main/C/aes-loader-stageless.c>
7171
- <https://github.com/cribdragg3r/Alaris>
7272
- <https://github.com/trustedsec/COFFLoader>
73+
- <https://github.com/stephenfewer/ReflectiveDLLInjection>
74+
- <https://github.com/Cracked5pider/KaynLdr>
75+
- <https://github.com/mgeeky/ElusiveMice>
76+
- <https://github.com/boku7/BokuLoader>
7377
7478
### Nim
7579
7680
- <https://github.com/aeverj/NimShellCodeLoader>
7781
- <https://github.com/sh3d0ww01f/nim_shellloader>
82+
- <https://github.com/S3cur3Th1sSh1t/Nim-RunPE>
7883
7984
### Go
8085
- <https://github.com/CMEPW/myph>
8186
- <https://github.com/EddieIvan01/gld>
8287
- <https://github.com/zha0gongz1/DesertFox>
88+
- <https://djnn.sh/what-i-learned-writing-a-loader-in-golang>
89+
- <https://github.com/Ne0nd0g/go-shellcode>
90+
- <https://github.com/f1zm0/hades>
8391
8492
### Rust
8593
8694
- <https://github.com/b1tg/rs_shellcode>
8795
- <https://github.com/r4ime/shellcode_loader>
8896
- <https://github.com/cr7pt0pl4gu3/Pestilence>
97+
- <https://github.com/memN0ps/srdi-rs>
8998
9099
### Crystal
91100
@@ -229,6 +238,7 @@ markmap:
229238
- <https://sevrosecurity.com/2020/04/08/process-injection-part-1-createremotethread/>
230239
- <https://0xsp.com/security%20research%20%20development%20srd/defeat-the-castle-bypass-av-advanced-xdr-solutions/>
231240
- <https://github.com/0xsp-SRD/mortar>
241+
- <https://www.blackhat.com/docs/asia-17/materials/asia-17-KA-What-Malware-Authors-Don't-Want-You-To-Know-Evasive-Hollow-Process-Injection-wp.pdf>
232242
233243
### Thread execution hijacking
234244
@@ -335,6 +345,7 @@ markmap:
335345
- [@Zabannn](https://twitter.com/Zabannn)
336346
- [@noraj_rawsec](https://twitter.com/noraj_rawsec)
337347
- [@lapinousexy](https://github.com/lap1nou)
348+
- [@djnn](https://github.com/bogdzn)
338349
339-
## Pro tips : A shellcode sent in 3 open sources packer will have more chance to be caught than a manual obfuscation
350+
## Pro tips : A shellcode going through 3 open-source packers will have more chance to get detected than a manual obfuscation
340351

0 commit comments

Comments
 (0)