Does anyone wanna learn some offensive security and Linux stuff?
Recently, I have been brushing up on my C2 skills and writing some FUD malware for Linux and Windows
I made a FUD stager the other day using deepseek, and some snippets of code from github shellcode loaders. It's best used with RC4 encrypted Sliver payloads (windows shellcode) over HTTPs. If anyone wants help using it, I'll monitor this thread.
Just substitute your staging URL and RC4 key in the main C file, and cross-compile with MINGW toolchain.
https://sliver.sh/docs?name=Getting+Started>>33283If anyone decides to download and test it on a windows VM, please make sure to disable "Automatic Sample Submission" in Windows Defender
hol up actually, gotta do some debugging to make the newly added AMSI patch work. If you wanna try it as is, just remove the BypassTelemetry from main in stager.c, and compile without the modules. It will still compile and run, and most likely bypass defender.