Category: Exploitation

Shellcode Fluctuation

Shellcode Fluctuation: advanced in-memory evasion technique

Shellcode Fluctuation PoC A PoC implementation for another in-memory evasion technique that cyclically encrypts and decrypts shellcode’s contents to then make it fluctuate between RW (or NoAccess) and RX memory protection. When our shellcode...

Run Powershell without software restrictions

PowerShx: Run Powershell without software restrictions

PowerShx PowerShx is a rewrite and expansion of the PowerShdll project. PowerShx provides functionalities for bypassing AMSI and running PS Cmdlets. Features Run Powershell with DLLs using rundll32.exe, installutil.exe, regsvcs.exe,...

Maldoc Generator

LittleCorporal: C# Automated Maldoc Generator

LittleCorporal LittleCorporal: A C# Automated Maldoc Generator How does It work? LittleCorporal accepts a user-supplied argument for a process to inject into a remote machine, in which you plan to...