Change the repository type filter
All
Repositories list
22 repositories
- A concise cheatsheet covering key process code injection techniques for red teaming and malware development.
- This repository contains a practical cheat sheet demonstrating various callback-based techniques to execute shellcode on Windows, with detection insights and code samples.
Multi-Platform-Malware
PublicCross-architecture malware designed to run seamlessly on both 32-bit and 64-bit Windows systems, featuring dynamic shellcode execution and reverse shell capabilities.Process-Hollowing
PublicProcess Hollowing is a stealthy injection method that runs malicious code inside a legitimate process.- A deep dive into asynchronous code injection using APC techniques. Includes code samples, step-by-step explanations, and real-world POCs.
- This repository demonstrates basic static detection evasion techniques for Windows Defender. It includes code to inject an XOR-encrypted reverse shell payload into a remote process using common Windows API calls. The payload is stored in the .rsrc section and decrypted at runtime.
- EarlyBird APC Injection is a stealthy process injection technique that queues malicious shellcode into a suspended thread of a newly created process. Once the thread is resumed, the payload executes, making detection and analysis more difficult.
- ThreadIDs and ProcessIDs: The foundation of malware techniques, covering the basics of PIDs, TIDs, and their role in code injection and malware devlopment,.
NT-API-Code-Injection
PublicNT API Code Injection using NtCreateSection and NtMapViewOfSection to inject shellcode into a remote process. This method allows for efficient memory manipulation and code execution within target processes.RatInject-Red-Team-Tool
PublicRatInject: C++ tool for stealthy Windows persistence via registry-based techniques.Hijacking-Remote-Thread
PublicTechnique to inject and execute code in a remote process by hijacking an existing thread.- A proof-of-concept demonstrating static antivirus evasion using AES-encrypted shellcode in C. Includes encryption script in Python and a runtime decryption/execution mechanism in Windows.
Crafting-Trojan-Guide
PublicThis repository demonstrates how a Trojan can be crafted by backdooring an executable using code caves and shellcode injection. It is intended purely for educational purposes in cybersecurity and ethical hacking.- Technique for AV evasion using XOR encryption to obfuscate payloads.
- A guide on how to executing Malicious Shell-Code with C++
- A terminal-based multiple reverse shell manager for pentesters. Built with Python to manage and persist multiple shell sessions with ease.
- Demonstrates antivirus evasion using Base64 encoding to bypass static detection methods.
Process-Code-Injection
PublicA simple implementation of process code injection. This demonstrates injecting shellcode into a remote process, using basic Windows API functions for process manipulation.- A practical cheatsheet demonstrating key Windows persistence methods for red team assessments and malware research.
- A method for achieving Windows persistence by leveraging the Winlogon registry key. It includes a modified C++ reverse shell and a step-by-step guide on using the Userinit key to maintain access to a Windows system after reboot or user logoff.