Lists of techniques used to hide your payload
Obfuscation is a way to hide a shellcode. generally symmetric algorithms are used
Below is a list of ways that allow you to go under the radar of anti-virus software, so put all the chances on your side and use several techniques. You should also
change the logoof the binary as well as its
creation date(sandboxes check that the binary is not too recent).
For this part the principle is simple: camouflaged its active load, to do this you will need to code a function to encode, but also to decode, free to choose algorithm this technique works particularly well for static bypass.
Here is a link that will allow you to understand and write your first program:
In order to compromise the machine discreetly, sleeps are also used a lot, There are several methods:
WaitForSingleObjectEx, Foliage, Ekko, Deathsleep.
There are several ways to disable logging, either via
Depending on your needs, you can use tools available for the most part on github, they are sorted by category below.
You can also find all the tools in the mindmap section.
## Office macro
RemComSvc - https://gist.github.com/snovvcrash/123945e8f06c7182769846265637fedb