Skip to content

Latest commit

 

History

History
26 lines (14 loc) · 1.38 KB

README.md

File metadata and controls

26 lines (14 loc) · 1.38 KB

Shellcode not in Data

the script takes a file as argument the file must containt a raw shellcode such as : msfvenom_screen2

it then parse the file and return this output that can help you to declare your shellcode at runtime : shellcode_not_in_data_screen

a very simple static evasion method would be to stop declaring your shellcode in the DATA section and instead declare it at RUNTIME

this very simple script will allow you to go from this :

loader_screen VT_Screen1

To this :

loader_screen2 VT_Screen2

Indeed declaring a shellcode in DATA would make it written clear inside of the file... this defeat the purpose of any static evasion Now declare the shellcode in RUNTIME so you avoid getting easilly detected by stati analysis