← Back to Dashboard

Hooka

// Shellcode Loader Generator Masterclass

8
Modules
Go
Language
CLI
Interface
Lib
Go Package

Master shellcode loader generation with comprehensive evasion. Learn injection techniques, syscall gate methods, NTDLL unhooking, AMSI/ETW patching, sandbox detection, and how Hooka’s Go library and CLI combine them into weaponized loaders. By D3Ext.

01 Beginner

Introduction to Shellcode Loaders

What shellcode loaders are, the loader lifecycle, EDR detection layers, and how Hooka compares to ScareCrow, Freeze, and Shhhloader.

02 Beginner

Injection Techniques

SuspendedProcess, ProcessHollowing, NtCreateThreadEx, callback-based execution, APC injection, No-RWX, and remote thread variants.

03 Beginner

Syscalls & Gate Techniques

Windows syscall internals, direct syscalls in Go, Hell’s Gate, Halo’s Gate, Tartarus’ Gate, and API hashing for function resolution.

04 Intermediate

Unhooking & Patching

EDR hooking mechanisms, Classic unhooking, Full DLL unhooking, Perun’s Fart, AMSI patching (2 methods), and ETW patching (2 methods).

05 Intermediate

Sandbox Detection & Process Protection

Eight sandbox checks (CPU, RAM, disk, hostname, drivers, processes, username, internet), ACG Guard, BlockDLLs policy, Phant0m EventLog suppression, and custom sleep.

06 Intermediate

Encryption & Obfuscation

AES, 3DES, RC4, XOR shellcode encryption, Shikata Ga Nai encoding, Caesar cipher strings, random naming, UPX compression, and code signing.

07 Advanced

The Hooka Go Library

Importing pkg/hooka, programmatic loader creation, combining injection + evasion + encryption, sRDI DLL conversion, and custom tooling.

08 Advanced

CLI Generator & Full Chain

Complete CLI reference, building loaders for real scenarios, maximum evasion combinations, output formats, testing, and operational tradecraft.

References & Resources