From 16f8989e97597572bf817619622b9e6af28d368a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E7=A7=8B=E8=A3=A4=E5=B0=8F=E6=B8=85=E6=96=B0?= <72319307+Answerr@users.noreply.github.com> Date: Mon, 20 Jan 2025 17:31:29 +0800 Subject: [PATCH] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 28ac064..81be508 100644 --- a/README.md +++ b/README.md @@ -1,8 +1,8 @@ -Shellcode Loader Bypass Techniques +**Shellcode Loader Bypass Techniques** This repository contains examples of advanced Shellcode Loader bypass techniques implemented in test.cpp and bypass1.cpp. These techniques are designed to evade detection and bypass modern security mechanisms such as EDR (Endpoint Detection and Response) and AV (Antivirus) solutions. Note: Using binary files smaller than 100kb tends to be more stable due to memory allocation limits imposed by thread pool execution; otherwise, you may need to sacrifice stealth. -Techniques in test.cpp +**Techniques in test.cpp** The following bypass techniques are implemented in test.cpp: API Resolution and Dynamic Invocation