
ShellcodePack
Shellcode and third party tools Weaponization
ShellcodePack turns shellcode and PE files (including Go, Rust, and DotNET) into deployment-ready payloads with layered advanced evasion (including assembly-level evasion). No custom bypass code required. Multiple output formats, configurable stacking, consistent results across operations, compatible with all commercial and opensource C2s. It also provides social engineering options.
What ShellcodePack Does
ShellcodePack sits between a binary code and execution-ready payloads. Where MacroPack Pro handles mostly the delivery format and initial access vector, ShellcodePack handles what is inside: making the shellcode itself survive memory scanning, behavioral analysis, and assembly-level detection.
The core problem it addresses is consistency. Manual shellcode obfuscation is done differently by different operators. Varying quality, varying evasion effectiveness, varying time investment. ShellcodePack standardizes that process. Anything you feed in is turned into a weaponized output with documented, tested evasion layers applied uniformly.
ShellcodePack generates payloads in multiple formats and is compatible with common offensive frameworks/ tools such as Merlin and Sliver, among others. Users feed ShellcodePack a third party shellcode or use one of the ready-to-use templates. ShellcodePack also implements features to help vulnerability research and exploitation such as DLL proxy, service generation, etc. ShellcodePack is regularly tested to evade Antivirus and advanced EDR products. ShellcodePack is delivered with ready to use bypass profiles which you can select to bypass a targeted EDR
Features Overview
| Category | Features |
|---|---|
| Input | .bin, .exe (including Go and Rust), .dll, .NET assemblies, .asm, .c, .py, .txt |
| Output | .bin, .exe (native or .NET), .scr, .dll (native or .NET), .cpl, .xll, .c, .py, .asm, .txt, trojan existing binaries |
| Architecture | x86, x64, x96 (dual-architecture 32+64-bit) |
| EDR Evasion | Evade static and runtime detections. Tested in real operations against multiple EDRs and Antivirus. |
| Social Engineering | Add decoy, spoof extension, spoof icon, spoof certificate, etc, Mark Of the Web evasion help |
| Payload Customization | Multiple methods to launch or stage shellcodes, Guardrails (such as domain name, validy dates, etc), possibility to add custom code, different ways to run a payload |
| Delivery | Payload packing, DLL proxying/sideloading, Windows Service, TCP/HTTPS stagers, AppDomain Injection |
| Platforms | GUI and CLI, tested on Windows 10 and 11 |
Key Capabilities
Advanced Delivery
EDR Evasion Methods
Output Formats
Export weaponized shellcode in any format to match your loader or delivery method.
Raw binary for any external loader
Standalone PE with embedded loader (C++ or .NET Loader)
Screen-saver and program info PE variants
Reflective DLL for process injection (C++ or .NET Loader)
Control Panel applet for lure scenarios
Excel Add-In for Office delivery
C source with shellcode array and loader stub
Python script with ctypes-based execution
Assembly source for custom integration
Bypass Profiles and Presets
Pre-built, production-tested profiles for major EDRs and Antivirus. Select a profile for your target environment and ShellcodePack applies the appropriate bypass chain automatically.
Each profile is tuned to the specific detection logic of the target EDR, not a generic bypass.
Profiles combines format, execution method, and evasion technique for common engagement scenarios.
Profiles are updated as EDR vendors release new detection improvements. Licenses include regular profile updates.
Manual Approach vs ShellcodePack
| Task | Manual Approach | ShellcodePack |
|---|---|---|
| Basic launcher XOR encoding | 30-60 min (custom script) | Under 1 min |
| Runtime Evasion Implementation (ex Indirect Syscalls) | Several hours (per implementation) | Configurable, instant |
| EDR-specific tuning | Full research cycle per EDR | Select from tested profile |
| Consistency across team | Varies by operator skill | Identical output |
| Multi-layer stacking | Error-prone manual steps | Single command |
| Output format conversion | Separate tooling required | Built-in multi-format |
ShellcodePack for TIBER-EU Weaponization
TIBER requires that simulated attack techniques accurately reflect the threat actor's known TTPs. ShellcodePack's configurable obfuscation stack allows red teams to match threat-actor-specific shellcode characteristics documented in the Threat Intelligence Report - producing technically accurate weaponization rather than generic bypasses.
Learn how BallisKit supports TIBER-EUPricing
- All evasion and customization methods
- All 11+ output formats
- All EDR bypass profiles and presets
- Regular updates including EDR evasion
- Customization, history, and custom presets
- Discord and Email support
Bundle pricing available with MacroPack Pro and DarwinOps.
Volume licensing for 3+ users. Contact contact@balliskit.com.
Professional email required. Anonymized or consumer domains not accepted.
Tutorials and Resources

Tutorial: Adaptix C2 with ShellcodePack and MacroPack
Learn how to weaponize Adaptix C2 Agents with BallisKit redteaming tools

AppDomain Injection -Backdooring .NET Framework Applications
AppDomain Injection is a technique that allows you to execute arbitrary code within .NET Framework applications by hijacking the AppDomain…

DLL Sideloading and function proxying with ShellcodePack
DLL sideloading is a technique that allows an attacker to have a legitimate signed application run some malicious code on Windows. It work…
