| Nov | DEC | Jan |
| 16 | ||
| 2019 | 2020 | 2021 |
COLLECTED BY
Collection: github.com
Drag your raw shellcode(.bin) into the generator
Choose the loader's arch (default x86),And select the configuration options you want, whether you want to autostart(which comes with a registry), and whether you want to antisandbox(This option is not required for most 64-bit loaders)
Choose how you want to load it. Different loading methos depending on the loading template in the DATA floder.
**Click Generate and the final loader will be generated on the desktop. **
It will return the pointer of shellcode in resource,and shellcodesize is size of sehllcode.In most cases, this step doesn't need to be changed, you can do anything after you get the shellcode.
Loading shellcode in your method ,and compile(PS:Make sure you compile statically and cancel the debug symbolic link)
Use method name your template,this name will be loading method's name on UI,and change its format to "DAT",,Put it in correct arch in DATA folder ,The generator will automatically get the loading method.
| Loading methods | Detected |
|---|---|
| CreateThreadpoolWait Load | 3/72 |
| Fiber Load | 4/72 |
| NtTestAlert Load | 5/70 |
| SEH Except Load | 2/72 |
| TLS CallBack Load | 28/71 |
| Dynamic Load | 1/72 |
| Dynamic Load plus | 28/71 |
| Syscall Load | 1/69 |
| APC-Inject Load | 6/72 |
| Early Brid APC-Inject Load | 4/72 |
| NtCreateSection-Inject Load | 2/71 |
| OEP Hiijack-Inject Load | 3/72 |
| Thread Hiijack-Inject Load | 6/72 |
Bypass network interception of norton's smart firewall,and online by this tool.