nim-shellcode-fluctuation

Community

Evade EDR memory scanners.

AuthorAeonDave
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps evade detection by memory scanners, particularly Endpoint Detection and Response (EDR) systems, by encrypting shellcode in memory between executions.

Core Features & Use Cases

  • Memory Encryption: Encrypts injected shellcode in memory using XOR or RC4 between C2 callbacks.
  • Dynamic Memory Permissions: Modifies memory page permissions (RX, RW) to hide shellcode during sleep periods.
  • Use Case: Deploying implants that need to remain undetected by in-memory scanning of RWX regions, especially in environments with active EDR solutions.

Quick Start

Build the agent by running nim c -d:release -d:strip --opt:size -o:agent.exe fluctuation.nim after installing Nim and the winim library.

Dependency Matrix

Required Modules

winimnim-mangle

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: nim-shellcode-fluctuation
Download link: https://github.com/AeonDave/malskill/archive/main.zip#nim-shellcode-fluctuation

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.