⚙️Basics
Some basics concepts regarding executable obfuscation, trojans, stubs and shellcode generation (the "quick and dirty" way, no asm development at this point)
In this section, I’ll outline the methodologies I’ve developed for basic tasks regarding manipulation or transformation of compiled executables. theses basics manipulations are quite util to make tool generated (like msfvenom payloads) executables more accurate and "stealth". These techniques are aimed at adding simple yet effective modifications to help bypass antivirus (AV) static detection 🚫.
🎯 Main Goals
The primary goals of this section are:
Transform a compiled executable into shellcode 🐚: to embed it in custom programs
Create your own basic stub 🧩: to run your embedded shellcode from your own homemade executable
Understant AV detection logic 🧠: Understand the basis of detection methods used by antiviruses.
Evade antivirus detection 🔒: Apply obfuscation to make executables less recognizable by AV tools, even when they contain known hashes or patterns 🔍.
By following these methods, you’ll be able to reduce detection risks when working with generated executables that might otherwise trigger AV alerts due to signature or pattern based detection 👁️.
Last updated