OP 17 June, 2025 - 08:22 PM
Looking for a way to keep your payloads fully off the radar?
I’ve built a custom tool that I maintain personally. It’s not public, and it’s designed to make your shellcode completely undetectable during in-memory injection, even against modern EDRs and antivirus software.
The core loader is fully written in x64 NASM assembly, and each generated client includes a unique loader variant. This ensures maximum evasion and reduces the chance of static detection.
The interface is built in Rust, available in both GUI and CLI versions, and compiled for Windows and Linux. You simply run the tool on your VPS, import your shellcode, choose an output filename, click generate and get a stealthy, ready-to-use loader in seconds.
Right now, this is an MVP. I’ve got a long list of features in mind to turn it into a full-fledged evasion framework. But first, I’d like to get a sense of the market.
Would anyone here be interested in something like this? I’d really appreciate your feedback.
I’ve built a custom tool that I maintain personally. It’s not public, and it’s designed to make your shellcode completely undetectable during in-memory injection, even against modern EDRs and antivirus software.
The core loader is fully written in x64 NASM assembly, and each generated client includes a unique loader variant. This ensures maximum evasion and reduces the chance of static detection.
The interface is built in Rust, available in both GUI and CLI versions, and compiled for Windows and Linux. You simply run the tool on your VPS, import your shellcode, choose an output filename, click generate and get a stealthy, ready-to-use loader in seconds.
Right now, this is an MVP. I’ve got a long list of features in mind to turn it into a full-fledged evasion framework. But first, I’d like to get a sense of the market.
Would anyone here be interested in something like this? I’d really appreciate your feedback.