Skip to content

ZigStrike is a powerful shellcode loader in Zig, featuring multiple injection techniques and anti-sandbox measures. Explore its capabilities on GitHub! πŸ™πŸŒ

Notifications You must be signed in to change notification settings

manishvermaindore/ZigStrike

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

8 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

ZigStrike: Advanced Shellcode Loader in Zig for Security Experts πŸ›‘οΈ

ZigStrike GitHub Release

Download Latest Release

Table of Contents

Overview

ZigStrike is a robust shellcode loader developed in Zig. It offers a variety of injection techniques and anti-sandbox features. By leveraging compile-time capabilities, ZigStrike efficiently allocates shellcode. It has proven successful in bypassing advanced security solutions, making it a valuable tool for cybersecurity professionals.

Features

  • Multiple Injection Techniques: Supports various methods for shellcode injection, enhancing flexibility.
  • Anti-Sandbox Mechanisms: Includes features designed to evade detection by sandbox environments.
  • Compile-Time Allocation: Utilizes Zig's compile-time capabilities for efficient memory management.
  • User-Friendly Interface: Simple command-line interface for ease of use.
  • Active Development: Regular updates and improvements based on user feedback.

Installation

To get started with ZigStrike, follow these steps:

  1. Clone the Repository:

    git clone https://github.com/manishvermaindore/ZigStrike.git
    cd ZigStrike
  2. Build the Project: Ensure you have Zig installed. You can download it from the Zig website.

    zig build
  3. Download Latest Release: For the latest version, visit the Releases section. Download the appropriate file and execute it.

Usage

Once you have installed ZigStrike, you can use it from the command line. The basic syntax is as follows:

./zigstrike <options>

Options

  • -h, --help: Display help information.
  • -i, --inject: Specify the injection method.
  • -s, --shellcode: Provide the shellcode to be loaded.

Example

./zigstrike -i method1 -s my_shellcode.bin

Injection Techniques

ZigStrike supports several injection techniques, including:

  1. Process Hollowing: Replaces the memory of a target process with shellcode.
  2. Thread Injection: Creates a new thread in a target process to execute shellcode.
  3. Reflective DLL Injection: Loads a DLL into a target process without writing to disk.

Each technique has its advantages and can be selected based on the target environment.

Anti-Sandbox Features

ZigStrike includes several features to help evade detection:

  • Environment Checks: Identifies if the program is running in a sandbox.
  • Timing Checks: Measures execution time to differentiate between real and simulated environments.
  • User Interaction: Waits for user input before executing shellcode, reducing automated detection.

Contributing

Contributions are welcome! If you would like to contribute to ZigStrike, please follow these steps:

  1. Fork the repository.
  2. Create a new branch for your feature or bug fix.
  3. Commit your changes.
  4. Push your branch to your fork.
  5. Open a pull request.

Please ensure that your code follows the existing style and includes appropriate tests.

License

ZigStrike is licensed under the MIT License. See the LICENSE file for more details.

Contact

For questions or feedback, feel free to reach out:

For the latest updates, check the Releases section.

About

ZigStrike is a powerful shellcode loader in Zig, featuring multiple injection techniques and anti-sandbox measures. Explore its capabilities on GitHub! πŸ™πŸŒ

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •