Loading...
I've worked hard to develop a new method that tricks the kernel and injects shellcode in a novel way. It hides the target process behind a legitimate process (like System32 or Explorer). Most shellcode injection attempts are detected when a thread is created in a legitimate process, causing the code to abort or even crash the process, which often requires a reboot to fix.
FEATURES:
- Hides shellcode inside a legitimate process without causing it to crash.
- Uses a non-rootkit method, meaning it does not rely on a malware driver that would need verification by Microsoft.
- Windows Defender sees it like this: "Oh, hi, you're System32. Go ahead and manipulate the process as you want."
- 87% of the injector is written in C, with the remaining codebase in C++. It has no dependencies and supports any compiler.
- Supports all shellcode based on an EXE's PE header.
- It's a zero-day exploit, so use it as you wish.
As of now, this injector is a zero-day, meaning it is undetected and works as intended. Microsoft is not overly concerned about it yet, so it likely won't be patched soon. However, remember that "zero-day" means you need to complete your job quickly before it gets discovered.
I will delete this listing if the exploit is no longer a zero-day and Microsoft patches it with an update.
Product images
Replies
Confirm Deletion
Are you sure you want to delete this reply? This action cannot be undone.
There are no replies yet. Be the first to reply.