Skip to content

Evi1Grey5/Shellcode-Loader

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Bypass EDR/AV [LOADER] ShellCode

This project illustrates a method for circumventing modern security defenses, including AV/EDR solutions, by exploiting Windows API functions to inject a malicious payload directly into a process's memory space. This allows the payload to remain undetected while establishing a connection with a remote system, enabling remote access and control.
  • Open the project in Visual Studio or use the following command to compile the code using .NET SDK:
csc shellcodeloader.cs /
csc loader_update.cs / 

**Alternatively, you can compile in Release mode for better optimization:

csc -optimize

To avoid detection by advanced EDR solutions, consider using methods such as process injection, obfuscation, or AMSI bypasses.

Caution

Please note that the use of this code may be illegal and should only be used for educational purposes.

Contacts: injectexp.dev / pro.injectexp.dev / Telegram: @Evi1Grey5 [support] Tox: 340EF1DCEEC5B395B9B45963F945C00238ADDEAC87C117F64F46206911474C61981D96420B72

About

Bypass EDR/AV [LOADER] ShellCode

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages