mirror of
https://github.com/Answerr/shellcode_loader_bypass.git
synced 2026-02-07 11:03:14 +08:00
Update README.md
This commit is contained in:
17
README.md
17
README.md
@@ -57,10 +57,19 @@ The following bypass techniques are implemented in `bypass1.cpp`:
|
||||
Allocates memory for shellcode in a stealthy manner, avoiding suspicious patterns that could trigger detection.
|
||||
|
||||
---
|
||||
https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/360_bypass1.png
|
||||
https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/Defender_test.png
|
||||
https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/huorong_bypass1.png
|
||||
https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/tencent_bypass1.png
|
||||
## Shellcode Loader Bypass Images
|
||||
|
||||
### 1. 360 Bypass
|
||||

|
||||
|
||||
### 2. Defender Test
|
||||

|
||||
|
||||
### 3. Huorong Bypass
|
||||

|
||||
|
||||
### 4. Tencent Bypass
|
||||

|
||||
## Summary
|
||||
|
||||
Both `test.cpp` and `bypass1.cpp` demonstrate a variety of techniques to bypass modern security mechanisms. These techniques focus on:
|
||||
|
||||
Reference in New Issue
Block a user