This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
-
Updated
Apr 29, 2023 - C
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.
Various methods of executing shellcode
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
A collection of PoCs for different injection techniques on Windows!
Collection of shellcode injection and execution techniques
PoC arbitrary WPM without a process handle
A server for testing shellcode injection over a buffer overflow
Various dll hollowing techniques
drx ptrace shellcode injector
You should look through my Assembly LearningRepo first before learning Shellcoding.
An IT security project
Lazy "position independent" payload making technique for Windows
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
Code for example Thread-Hijacking method
Add a description, image, and links to the shellcode-injection topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-injection topic, visit your repo's landing page and select "manage topics."