FiberAPCNTshellcodeloader is a C++ project demonstrating shellcode loading and execution via Asynchronous Procedure Call (APC) injection. This project showcases advanced techniques for memory allocation, shellcode decryption, and injection on Windows systems. It is intended solely for research, educational, and authorized security testing purposes.
Important Disclaimer
This project is provided strictly for educational and legitimate security testing. Any use of this software for illegal or malicious purposes is prohibited. The author disclaims any responsibility for misuse.
-
Shellcode Loading
Load encrypted shellcode (e.g., from a file) for later injection. -
Memory Allocation
Allocate memory regions using native Windows NT functions, avoiding conventional WinAPI patterns. -
Shellcode Decryption
Decrypt shellcode using an XOR-based method, enabling stealthy payload handling. -
APC Injection
Inject and execute shellcode through an APC mechanism to bypass certain security measures.
- Operating System: Windows
- Build System: CMake 3.29 or higher
- Compiler: Visual Studio or a compatible C++ compiler
-
Clone the Repository
git clone https://github.com/yourusername/fiberAPCNTshellcodeloader.git cd fiberAPCNTshellcodeloader
-
Create and Enter a Build Directory
mkdir build cd build
-
Generate Build Files with CMake
cmake ..
-
Build the Project
cmake --build .
-
Prepare Encrypted Shellcode
Place your XOR-encrypted shellcode in a file namedencrypted_shellcode.data
. -
Run the Executable
./fiberAPCNTshellcodeloader
The program will allocate memory, decrypt the shellcode, and inject it via APC.
-
VirusTotal Detection
A scan on VirusTotal shows 6 detections.
View the Report -
Security Bypass (CobaltStrike Beacon Payload)
Demonstrates successful evasion against 360 Total Security and Huorong (火绒).
-
For Educational Purposes Only
This software should be used exclusively in controlled test environments or with explicit authorization. -
Legal Responsibility
The user bears all responsibility for compliance with relevant laws and regulations. The author disclaims any liability arising from misuse. -
Potential False Positives
Some antivirus solutions may flag or quarantine the binary due to its low-level operations and injection techniques.
This project is distributed under the MIT License.
For any inquiries or discussions, please reach out to the author at [email protected].
Disclaimer: This project is intended for authorized testing and research. The author assumes no liability for misuse.