Skip to content

kamyasec/tiny-imposter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 

Repository files navigation

tiny-imposter

A small project re-creating well-known techniques in PE-infection, because I couldn't find any I liked to use. Also because I wanted to explore PEs and shellcoding a little. There are many ways to extend the program to get better evasion.

Inspiration:

Dependencies:

Usage:

$ python3 tiny-imposter.py legit.exe shellcode.bin

It works by adding a new section to the PE, creating a jump pad in .text by replacing null-bytes and changing the entrypoint. The jump pad calls a wrapper in the added section which calls CreateThread on the supplied shellcode before jumping back to the original entrypoint.

Normal PE:

PE => entrypoint

impostered PE:

PE => jump pad => added section launcher => shellcode
                                => entrypoint

No clue if this works with DLLs. Wont work with managed code.

About

Just another PE infection PoC.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages