Skip to content

Latest commit

 

History

History
14 lines (12 loc) · 910 Bytes

README.md

File metadata and controls

14 lines (12 loc) · 910 Bytes

malwareDevelopment

Simple malware samples developed as a proof-of-concept using C and the Win32API utilising process injection techniques which involve injecting malicious shellcode into benign processes.

Shellcode Injection

  1. Get a handle on a process by attaching to, or creating one.
  2. Allocate a buffer in the process memory with the necessary permissions.
  3. Write the contents of your shellcode to that buffer in the process memory.
  4. Create a thread that will run what you've surgically allocated and written into the process!

DLL Injection

  1. Get a handle on a process by attaching to, or creating one.
  2. Allocate a buffer in the process memory with the necessary permissions.
  3. Load a custom DLL to that buffer in the process memory.
  4. Create a thread that will run what you've surgically allocated and written into the process!