From 1157ad1a0983e0921a60de413cd17b0390389d71 Mon Sep 17 00:00:00 2001 From: jason123 <72319307+Answerr@users.noreply.github.com> Date: Wed, 11 Dec 2024 11:56:44 +0800 Subject: [PATCH] Update README.md --- README.md | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index fc2d366..d23aa59 100644 --- a/README.md +++ b/README.md @@ -57,7 +57,10 @@ The following bypass techniques are implemented in `bypass1.cpp`: Allocates memory for shellcode in a stealthy manner, avoiding suspicious patterns that could trigger detection. --- - +https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/360_bypass1.png +https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/Defender_test.png +https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/huorong_bypass1.png +https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/tencent_bypass1.png ## Summary Both `test.cpp` and `bypass1.cpp` demonstrate a variety of techniques to bypass modern security mechanisms. These techniques focus on: