Skip to content

Commit 19ebd97

Browse files
committed
Some Changes/Fixes
Altered ReadME.md and Fixed Direct Syscall PoC using SSN STUB
1 parent b0c8c24 commit 19ebd97

File tree

6 files changed

+210
-147
lines changed

6 files changed

+210
-147
lines changed

README.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -15,9 +15,9 @@
1515

1616
## Table of Contexts
1717

18-
- [Rust for Malware Development](#rust-for-malware-development)
18+
- [Rust for Malware Development](#malware-techniques)
1919
* [Walkthrough](#beginner-path)
20-
* [Malware Techniques](#techniques)
20+
* [Malware Techniques](#malware-techniques)
2121
* [Malware Encryption Techniques](#encryption-techniques)
2222
* [Malwre Blogs Regarding the Repository](#rust-malware-blogs-regarding-this-repostitory)
2323

@@ -54,7 +54,8 @@
5454
| [Position Independent Series](position%20independent) | Position independent series in Rust. |
5555
| [Shellcode Execution methods](shellcode_exec) | Shellcode execution methods using WinApi's. |
5656
| [Sleep Obfuscation](Sleep_Obfuscations/Ekko) | Sleep Obfuscation implementation in Rust. |
57-
| [Syscalls](syscalls/) | Syscall Implementation using system call STUB [Direct/Indirect] methods. |
57+
| [Direct Syscalls](./syscalls/direct_syscalls/) | Direct Syscall Impl using system call STUB methods. |
58+
| [Indirect Syscalls](./syscalls/indirect_syscalls/) | Indirect Syscall Impl using system call STUB methods. |
5859
| [BSOD](BSOD) | Causes BSOD when Executing. |
5960
| [Persistence](Persistence) | Persistence Code Snippet. |
6061
| [UAC Bypass CMSTP](uac-bypass-cmstp/) | Bypass UAC by elevating CMSTP.exe |
@@ -64,8 +65,9 @@
6465
| [Timer](./timer/) | A Program that uses Time-based execution control mechanism. |
6566
| [Keylogger Dropper](keylog_dropper) | Downloads keylogger and sender on victim PC and executes in background. |
6667
| [Rand_Fill](Malware_Tips/rand_fill/) | A Small Parallel Program that Deletes All Files on Disk and Fills with Random Bytes, Making the Recovery Process Impossible. |
67-
| [Encryfer-X](Malware-Samples/Encryfer/) | Ransomware written by combining all Possible POC techniques. |
68-
| [Github Stealers](./stealer/GitHub_API/)
68+
| [Encryfer-X](./Malware-Samples/Encryfer/Encryfer-X/) | Ransomware written by combining all Possible POC techniques. |
69+
| [Github Stealers](./stealer/GitHub_API/) | Steal Creds using Github API |
70+
6971

7072
## Encryption Techniques
7173

syscalls/direct_syscalls/Cargo.toml

Lines changed: 30 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,34 @@ version = "0.1.0"
44
edition = "2021"
55

66
[dependencies]
7-
winapi = { version = "0.3.9", features = ["winuser","setupapi","dbghelp","wlanapi","winnls","wincon","fileapi","sysinfoapi", "fibersapi","debugapi","winerror", "wininet" , "winhttp" ,"synchapi","securitybaseapi","wincrypt","psapi", "tlhelp32", "heapapi","shellapi", "memoryapi", "processthreadsapi", "errhandlingapi", "winbase", "handleapi", "synchapi"] }
7+
rust_syscalls = { git = "https://github.com/janoglezcampos/rust_syscalls", features = ["_DIRECT_"] }
8+
9+
winapi = { version = "0.3.9", features = [
10+
"winuser",
11+
"setupapi",
12+
"dbghelp",
13+
"wlanapi",
14+
"winnls",
15+
"wincon",
16+
"fileapi",
17+
"sysinfoapi",
18+
"fibersapi",
19+
"debugapi",
20+
"winerror",
21+
"wininet",
22+
"winhttp",
23+
"synchapi",
24+
"securitybaseapi",
25+
"wincrypt",
26+
"psapi",
27+
"tlhelp32",
28+
"heapapi",
29+
"shellapi",
30+
"memoryapi",
31+
"processthreadsapi",
32+
"errhandlingapi",
33+
"winbase",
34+
"handleapi",
35+
"synchapi",
36+
] }
837
ntapi = "0.4.1"

syscalls/direct_syscalls/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
11
## Direct Syscalls
22

3-
![Direct Syscalls](./direct_syscalls.png)
3+
![Direct Syscalls](./image.png)
44

55
### Working Methodology
66

77
Uses ntdll.dll and GetProcAddress to fetch syscall numbers for injection.
88

99
Allocates memory in the target process, writes shellcode, and executes it using NtCreateThreadEx.
1010

11+
Download Here: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/syscalls/direct_syscalls)
1112
## Credits
1213

14+
* https://github.com/janoglezcampos/rust_syscalls.gitcode
1315
* https://redops.at/en/blog/direct-syscalls-vs-indirect-syscalls
1416
* https://www.ired.team/offensive-security/code-injection-process-injection/ntcreatesection-+-ntmapviewofsection-code-injection
1517

syscalls/direct_syscalls/image.png

104 KB
Loading

0 commit comments

Comments
 (0)