Lazy "position independent" payload making technique for Windows
-
Updated
Feb 13, 2024 - C
Lazy "position independent" payload making technique for Windows
An IT security project
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
Code for example Thread-Hijacking method
You should look through my Assembly LearningRepo first before learning Shellcoding.
A server for testing shellcode injection over a buffer overflow
drx ptrace shellcode injector
Various dll hollowing techniques
Collection of shellcode injection and execution techniques
PoC arbitrary WPM without a process handle
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
A collection of PoCs for different injection techniques on Windows!
Various methods of executing shellcode
A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
Process Injection using Thread Name
Add a description, image, and links to the shellcode-injection topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-injection topic, visit your repo's landing page and select "manage topics."