A step-by-step educational resource for developing polymorphic loaders and payloads in x86-64 Assembly for Linux using only syscalls and no external dependencies.
Desarrollo paso a paso de loaders y payloads polimórficos, escritos exclusivamente en Ensamblador x86-64 para Linux, sin dependencias externas y utilizando solo syscalls. | Step-by-step development of polymorphic loaders and payloads, written exclusively in x86-64 Assembly for Linux, without external dependencies and using only syscalls.
This tool is designed for security professionals, penetration testers, and red teamers who want to deeply understand polymorphic and metamorphic payload techniques at the assembly level. It serves as a practical learning platform to master writing polymorphic shellcode and loaders in Linux x64 environments, enhancing skills in evasion and payload development.
This repository is primarily an educational resource and the code examples prioritize readability and teaching over performance or size optimization. Users should have a basic understanding of x86-64 Assembly and Linux syscalls to fully benefit from the material. It is recommended to study the detailed explanations accompanying each example to grasp the underlying polymorphic techniques.
Clone the repository using git clone https://github.com/Pithase/linux-asm-polymorphic-payloads.git
Navigate to the cloned directory
Use an assembler and linker compatible with x86-64 Linux (e.g., nasm and ld) to build the examples
No additional dependencies or installations are required
nasm -f elf64 example.asm && ld example.o -o example
Assemble and link an example polymorphic payload written in x86-64 Assembly
./example
Execute the compiled polymorphic payload or loader