将当前进程的 PE Image (Sections) 注入到其他进程运行,实现进程迁移。Inject the PE Image (Sections) of the current process into other processes to achieve process injection.
-
Updated
Jun 2, 2024 - C++
将当前进程的 PE Image (Sections) 注入到其他进程运行,实现进程迁移。Inject the PE Image (Sections) of the current process into other processes to achieve process injection.
Proof of concept, example of process hollowing, generating reverse TCP shellcode. Conducted on Windows 10 64 Bit 22H2.
🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.
Threadless shellcode injection tool
Using Dll process injection to use the input on word document to be monitored on attackers console
Centralized resource for listing and organizing known injection techniques and POCs
Nim process hollowing loader
Process injection framework in C#. It uses dynamic function loading using delegates and AES-encryption for strings and payloads
Download data from the internet bypassing the firewall using process injection
Malware development using C programming language and Windows32 API's
Materials from the speech "How to protect yourself from hidden web shells"
A CLI DLL injector written in C++ for x86 and x64 architectures.
Framework for Process Injection in Windows using Go
Running Shellcode using Rust
Works in any version from Windows 7 to 11. Injection of malicious code into legitimate Windows processes for evasion and simple malware to gain unauthorized access, using the Windows API. Serves as proof of concept or intrusion detection exercises.
Template-Driven AV/EDR Evasion Framework
PoC Linux process injection to hide execution of "benign" binary.
Add a description, image, and links to the process-injection topic page so that developers can more easily learn about it.
To associate your repository with the process-injection topic, visit your repo's landing page and select "manage topics."