-
Notifications
You must be signed in to change notification settings - Fork 4
Home
Deranged0tter edited this page Apr 16, 2025
·
3 revisions
Generate Secure, Polymorphic, Evasive Payloads
All of the following will be implemented by v1.0
- Shellcode
- PE
- DLL
- EXE
- DLL
- Fibers
- CreateThreadPoolWait
- Injection
- Local Thread
- Remote Thread*
- Local Thread Hijack (CreateThread)
- Local Thread Hijack (EnumThread)
- Remote Thread Hijack*
- APC
- EarlyBird APC*
- EarlyCascade
- Direct Syscalls*
- Indirect Syscalls*
- Callstack Spoofing
- Chunking
- Payload Encryption/Encoding
- AES
- RC4
- AMSI Patching* (HWBP)
- ETW Patching* (HWBP)
- DLL Unhooking*
- IAT Camouflage*
- API Hashing (Compile Time)
- String Hashing*
- Anti-Debug*
- Debugger Detection (Kinda)
- Self-Delete
- Anti-VM
- VM Detection
- TPM Check
- CPU Count
- RAM
- Resolution
- Execution Delay
- API Hammering
- WaitForSingleObject
- VM Detection
- File Bloating*
- Entropy Reduction*
- Custom Binary Metadata
- Custom Binary Icon
- Modify Creation Date/Time
- Hostname
- Domain Joined*
- Domain Name*
- Subnet*
*v1.0 Goals
This project was inspired by the amazing EvadeX from PhantomSec and OST from Outflank. If you and your team has the funds, I highly recommend them. This is just a shitty knock off because it seemed like a fun project.
If you want to learn more, I recommend ired.team and/or Maldev Academy