EN
ENNA
DO

Donut

Featured

🔥 Offensive Ops · C

Donut is a position-independent code generation tool that creates x86 or x64 shellcode payloads from .NET assemblies, PE files, DLLs, and VBS/JS/XSL files. The generated shellcode can load and execute the payload entirely in memory without touching disk, making it extremely useful for AV/EDR evasion. Donut supports encryption (Chaskey cipher), decoy module loading, and CLR bootstrapping for .NET payloads. It's a critical component in modern red team toolchains.

Use Cases

  • Converting .NET tools to position-independent shellcode
  • In-memory payload execution without disk writes
  • AV/EDR evasion through shellcode injection
  • Custom loader development for red team operations
  • Embedding tools in exploit payloads

Tags

shellcodein-memoryevasiondotnetposition-independent

More in Offensive Ops