“Mshikaki – kebab (skewered meat, especially beef)” yum yum. In the realm of cybersecurity, stealth and efficiency are paramount.
Enter ‘Mshikaki’, an advanced shellcode injection tool that stands out for its ability to seamlessly bypass the Antimalware Scan Interface (AMSI).
Designed for both security researchers and penetration testers, Mshikaki ensures that your code remains undetected while achieving its objectives.
Mshikaki is a shellcode injection tool designed to bypass AMSI (Antimalware Scan Interface).
It leverages the QueueUserAPC()
injection technique and offers support for XOR encryption, making it a powerful tool for security researchers and penetration testers.
git clone https://github.com/trevorsaudi/Mshikaki.git
cl /EHsc Mshikaki.cpp /link /SUBSYSTEM:CONSOLE
Mshikaki.exe -i <path_to_shellcode>
Mshikaki.exe -i <path_to_shellcode> -p <process_name>
The cp command, short for "copy," is the main Linux utility for duplicating files and directories. Whether…
Introduction In digital investigations, images often hold more information than meets the eye. With the…
The cat command short for concatenate, It is a fast and versatile tool for viewing and merging…
What is a Port? A port in networking acts like a gateway that directs data…
The ls command is fundamental for anyone working with Linux. It’s used to display the files and…
The pwd (Print Working Directory) command is essential for navigating the Linux filesystem. It instantly shows your…