- Overview
- Features
- Installation
- Usage
- Injection Techniques
- Anti-Sandbox Features
- Contributing
- License
- Contact
ZigStrike is a robust shellcode loader developed in Zig. It offers a variety of injection techniques and anti-sandbox features. By leveraging compile-time capabilities, ZigStrike efficiently allocates shellcode. It has proven successful in bypassing advanced security solutions, making it a valuable tool for cybersecurity professionals.
- Multiple Injection Techniques: Supports various methods for shellcode injection, enhancing flexibility.
- Anti-Sandbox Mechanisms: Includes features designed to evade detection by sandbox environments.
- Compile-Time Allocation: Utilizes Zig's compile-time capabilities for efficient memory management.
- User-Friendly Interface: Simple command-line interface for ease of use.
- Active Development: Regular updates and improvements based on user feedback.
To get started with ZigStrike, follow these steps:
-
Clone the Repository:
git clone https://github.com/manishvermaindore/ZigStrike.git cd ZigStrike
-
Build the Project: Ensure you have Zig installed. You can download it from the Zig website.
zig build
-
Download Latest Release: For the latest version, visit the Releases section. Download the appropriate file and execute it.
Once you have installed ZigStrike, you can use it from the command line. The basic syntax is as follows:
./zigstrike <options>
-h
,--help
: Display help information.-i
,--inject
: Specify the injection method.-s
,--shellcode
: Provide the shellcode to be loaded.
./zigstrike -i method1 -s my_shellcode.bin
ZigStrike supports several injection techniques, including:
- Process Hollowing: Replaces the memory of a target process with shellcode.
- Thread Injection: Creates a new thread in a target process to execute shellcode.
- Reflective DLL Injection: Loads a DLL into a target process without writing to disk.
Each technique has its advantages and can be selected based on the target environment.
ZigStrike includes several features to help evade detection:
- Environment Checks: Identifies if the program is running in a sandbox.
- Timing Checks: Measures execution time to differentiate between real and simulated environments.
- User Interaction: Waits for user input before executing shellcode, reducing automated detection.
Contributions are welcome! If you would like to contribute to ZigStrike, please follow these steps:
- Fork the repository.
- Create a new branch for your feature or bug fix.
- Commit your changes.
- Push your branch to your fork.
- Open a pull request.
Please ensure that your code follows the existing style and includes appropriate tests.
ZigStrike is licensed under the MIT License. See the LICENSE file for more details.
For questions or feedback, feel free to reach out:
- GitHub: manishvermaindore
- Email: manishvermaindore@example.com
For the latest updates, check the Releases section.