Skip to content

ianwolf99/EXPLOIT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

#checkout pefile python module

#on your python interpreter

import pefile pe = pefile.PE("file.exe") pe.print_info()

#juicy for windows portable executables

important note:under the proofs-of-concept folder you need ti edit the code inorder for it to work on your side

Encryption is one of those things that will defeat antivirus’ static scanning effectively, because the AV engine can’t crack it immediately. Currently, there are a few encryption/encoding types to protect the shellcode: AES256-CBC, RC4, XOR, and Base64. #but runtime detection will catch this babe

Machine learning scanners would take down softwares with dangerous windows API functions eg VirtualAlloc and WriteProcessMemory

https://cplusplus.com/

checkout this article by Microsoft

https://docs.microsoft.com/en-us/windows/win32/SecBP/avoiding-buffer-overruns

https://docs.microsoft.com/en-us/windows/win32/toolhelp/about-tool-help-functions

Encrypt the shellcode and decrypt in memory....use the CBC mode for AES Algorithim....The key and IV should always be Random....No one cryptography rule...key and IV should always be transmitted securely to the decryptor....

About

The repository contains code snippets to aid in exploit development

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published