Skip to content

Ethicalrat/Evasive-Loader

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

19 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Evasive-Loader

Evasive loader to bypass AVs/EDR detection

Features

  • RC4 encryption of shellcode

    • The shellcode loader has used Rc4 encryption/decryption with Windows inbuilt Systemfunction032/033
    • Decryption code is included in the project
    • Encryption code is given seperately. Feel free to use your own code to encrypt
  • Local mapping injection with callback function code execution

    • Local map injection technique used with NtCreateSection + NtMapviewOfSection
  • Hell's gate implementation with added capability of indirect syscall

  • Custom GetNtdllbase function with API hashing to avoid using GetModuleHandle

    • A custom GetNtdllBase function using PEB walk technique.
    • "Ntdll" is hashed and compared to avoid static detection

ToDo

  • Add ETW bypass code using HW breakpoint

Usage

  • Open the sln file in visual studios
  • Edit payload and decryption key and compile the binary
  • Requires Visual Studio 2019 and above.

Credits

  • Hell's Gate by @am0nsec and @RtlMateusz
  • @mr.d0x @NUL0x4C and @5pider for the awesome [Maldev academy] (https://maldevacademy.com/)

###!!! For Educational Purpose Only !!!

About

Evasive loader to bypass static detection

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published