[+] Written from scratch in C++
[+] Signature and API obfuscation.
[+] Up-to-date anti-sandbox logic.
Designed to bypass sandboxes with Virus Total and Hybrid Analysis.
Checks:
CPU, Disk, Memory, Mouse activity,
Adapter, MAC Address, Processes,
Sleep time, Uptime, Video adapter.
Each check is run in its own thread.
Total check time is one minute.
The check is accompanied by a hidden window, which makes the loader similar to a GUI program.
[+] UAC Bypass using the CMSTP method.
[+] Loading using steganography extracts shellcode from .jpg and .png images.
[+] Shellcode injection into the process via APC.
[+] Anti-debug logic with junk code branches.
[+] The build is ≈32 KB.
[+] Suitable for:
c2 shellcodes (e.g., from Cobalt Strike)
and so on, all you need is shellcode.
[+] No need for cryptography, the previous build has been running for over a month without being detected by AV.
[+] The original version of the silkod is stored on the server side, so it can be replaced free of charge at the user's request without losing already compromised machines.
[+] Contacts (For purchases, custom builds, questions)
TG: https://t.me/f_s0c1ety
qTox: 197CE1E9F5F27A51097E431164AA44C7B46FE9D25E5BB614D1DF5D2E5A4E847831A7F35138F7
Session: 05f68476cc9e2c5dae6081a4cabb18f933ae78af298aa8cb02f18521b1ce78d41f
[+] Signature and API obfuscation.
[+] Up-to-date anti-sandbox logic.
Designed to bypass sandboxes with Virus Total and Hybrid Analysis.
Checks:
CPU, Disk, Memory, Mouse activity,
Adapter, MAC Address, Processes,
Sleep time, Uptime, Video adapter.
Each check is run in its own thread.
Total check time is one minute.
The check is accompanied by a hidden window, which makes the loader similar to a GUI program.
[+] UAC Bypass using the CMSTP method.
[+] Loading using steganography extracts shellcode from .jpg and .png images.
[+] Shellcode injection into the process via APC.
[+] Anti-debug logic with junk code branches.
[+] The build is ≈32 KB.
[+] Suitable for:
c2 shellcodes (e.g., from Cobalt Strike)
and so on, all you need is shellcode.
[+] No need for cryptography, the previous build has been running for over a month without being detected by AV.
[+] The original version of the silkod is stored on the server side, so it can be replaced free of charge at the user's request without losing already compromised machines.
[+] Contacts (For purchases, custom builds, questions)
TG: https://t.me/f_s0c1ety
qTox: 197CE1E9F5F27A51097E431164AA44C7B46FE9D25E5BB614D1DF5D2E5A4E847831A7F35138F7
Session: 05f68476cc9e2c5dae6081a4cabb18f933ae78af298aa8cb02f18521b1ce78d41f