shellcode-fluctuation

Community

Evade EDR memory scans.

AuthorAeonDave
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill addresses the detection of injected shellcode by memory-scanning EDR products during C2 sleep intervals.

Core Features & Use Cases

  • Memory Evasion: Encrypts shellcode in memory between C2 communication periods.
  • EDR Bypass: Designed to defeat common memory scanning techniques used by Endpoint Detection and Response solutions.
  • Use Case: When your C2 implants are being flagged by EDR due to memory scanning, this technique can be employed to hide the shellcode during idle periods.

Quick Start

Integrate the C++ shellcode fluctuation technique into your implant by embedding the shellcode into the provided loader source and compiling it.

Dependency Matrix

Required Modules

None required

Components

references

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: shellcode-fluctuation
Download link: https://github.com/AeonDave/malskill/archive/main.zip#shellcode-fluctuation

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.