Skip to content

Latest commit

 

History

History
42 lines (31 loc) · 2.52 KB

README.md

File metadata and controls

42 lines (31 loc) · 2.52 KB

el84_injector_0.0

el84_injector_0.0 is a code injection tool developed for educational and security research purposes. It demonstrates advanced techniques in code injection and evasion, focusing on Windows environments. The tool utilizes API hashing, custom encoding/decoding methods, and direct manipulation of process memory to inject payloads into target processes without detection by Windows Defender.

image

Features

  • API Hashing: Utilizes API hashing to locate necessary WinAPI functions dynamically.
  • XOR Encoding: Encodes WinAPI function pointers with a random 64-bit value (XOR) to evade static analysis.
  • FCALL Macro: Simplifies WinAPI calls, enhancing code readability and maintainability.
  • Custom Encoding/Decoding: Implements a basic custom method for payload encoding and decoding to bypass security measures.
  • Simple Usage: Designed for easy use, requiring only the target process ID and a payload saved as shellcode.bin in the project directory.

Usage

  1. Place your x64 payload in a file named shellcode.bin in the project directory.
  2. Run build.sh to compile the injector. This script automates the process, including payload encoding and injector compilation.
  3. Execute injector.exe with the target process ID as the command line argument:
./injector.exe <pid>

Building from Source

The project can be built on systems with GCC and Mingw-w64 installed. The build process involves compiling helper programs for hash generation and payload encoding, followed by the main injector program.

Dependencies:

  • GCC (for hash and encode utilities)
  • x86_64-w64-mingw32-gcc (for compiling the injector on non-Windows platforms)
  • Any necessary libraries for Windows API calls

Build Steps: Refer to the build.sh script for detailed build commands and steps.

Disclaimer

This tool is intended for educational and security research purposes only. The author is not responsible for misuse or for any damage that may occur from using this tool. It is the end user's responsibility to comply with all applicable laws and regulations. The use of this tool against targets without prior mutual consent is illegal.

References