logo
Red team
Dancing with shadows: Outsmarting the digital watchdogs
  • Green team
  • Blue team
  • Purple team
  • Indigo team
  • Contact
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
          • Slippery paws: Practise makes untraceable
            • Threading the needle: The raccoon’s art of process injection
            • Dancing with shadows: Outsmarting the digital watchdogs
              • Basic assembly shellcode
              • Generate shellcode
              • Staged vs stageless payloads
              • Encoding and encrypting shellcode
              • Packers
              • Binders
            • Dancing with shadows: Outsmarting the digital watchdogs
              • Basic assembly shellcode
              • Generate shellcode
              • Staged vs stageless payloads
              • Encoding and encrypting shellcode
              • Packers
              • Binders
            • The masked marauder: Cloaking intent in code
            • Breaking the mould: Evading digital fingerprints
            • Slipping past the gatekeeper: Bypassing user account control
            • The invisible intruder: Evading real-time defences
            • Erasing the trail: Evading logging and monitoring
            • Urban survival: Using the environment against itself
            • Navigating the digital thicket: Evading network defences
            • Through the firebreak: Breaching digital barriers
            • Dodging the trap: Escaping the sandbox
      • OUT: Where squirrels swipe the crown jewels
      • Myrddin’s Menagerie

    Dancing with shadows: Outsmarting the digital watchdogs¶

    Antivirus systems are ever-vigilant, but even they have their weaknesses. Here, we delve into techniques such as encoding shellcode, using packers and binders, and crafting stageless payloads to slip past these digital sentinels, much like a raccoon evading the beam of a flashlight.

    AV evasion

    • Basic assembly shellcode
    • Generate shellcode
    • Staged vs stageless payloads
    • Encoding and encrypting shellcode
    • Packers
    • Binders

    THM Room: AV Evasion: Shellcode
    2025-08-26 12:59
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7