mgeeky / ShellcodeFluctuation

An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents
MIT License
921 stars 154 forks source link

(Question) When invoked as a manually mapped DLL from C#, the shellcode cannot be located #2

Closed CodeXTF2 closed 2 years ago

CodeXTF2 commented 2 years ago

Hi, I compiled this into a DLL and manually mapped it in C#, and the initializeShellcodeFluctuation function fails to locate my shellcode region. Any ideas?

CodeXTF2 commented 2 years ago

Fixed, issues seems to have been on my end when porting :P