Skip to content

Latest commit

 

History

History
17 lines (14 loc) · 1.74 KB

README.md

File metadata and controls

17 lines (14 loc) · 1.74 KB

malwhere

assorted malware techniques and related computer menaces.

payloads aren't actually malicious, they're like all msfvenom cmd.exe /c calc.exe shellcode or at worst the registry stager writes the msfvenom calc.exe shellcode to a registry key and leaves it there.

also defender instantly shreds most of these the second you compile them on account of the aforementioned msfvenom shellcode.

directory language technique
hardware-breakpoint-hooking Rust Patchless function hooking technique (local thread context*) that utilizes hardware breakpoints and vectored exception handlers to redirect thread execution.
hells-gate Rust Rust implementation of the hell's gate dynamic syscall invocation technique.
api-hooking Rust Windows API function hooking with a simple shellcode trampoline.
custom-api-functions Rust Dynamically resolves (?) Windows API function addresses from the ProcessEnvironmentBlock.
debug-detection Rust A handful of methods to detect debuggers.
fn-stomping Rust Re-writes the bytes of a benign API function in the context of a local process.
stager-registry Rust Writes a payload to the Windows registry and executes it.