Skip to content

Commit f984a31

Browse files
committed
Repo Structure
Making the PoC Repository well documented and Structured.
1 parent cbab091 commit f984a31

File tree

12 files changed

+183
-21
lines changed

12 files changed

+183
-21
lines changed

Process-Injection/README.md

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
## Process Injection 1
2+
3+
Here you can find the Process Injection Techniques Listed Below.
4+
5+
6+
* [APC Queue Injection New](./apc_quque_injection_new)
7+
* [APC Queue Injection](./apc_queue_injeciton)
8+
* [Early Bird Injeciton](./early_bird_apc_injection/)
9+
* [Loccal Process Injection](./inject_on_localprocess/)
10+
* [Remote Process Injection](./inject_on_remoteprocess/)
11+
* [PE Injection](./pe_injection/)
12+
* [ShellCode Execution 1](./shellcode_exec_1/)
13+
14+
15+
Download Process-Injection PoC: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Process-Injection/)
16+
17+
18+
## Credits / References.
19+
20+
Without all these resources it would not be possible to achieve this.
21+
22+
* https://www.ired.team/offensive-security/code-injection-process-injection/apc-queue-code-injection
23+
* https://www.ired.team/offensive-security/code-injection-process-injection/early-bird-apc-queue-code-injection
24+
* https://www.ired.team/offensive-security/code-injection-process-injection/process-injection
25+
* https://www.ired.team/offensive-security/code-injection-process-injection/pe-injection-executing-pes-inside-remote-processes
26+
27+
[@5mukx](https://x.com/5mukx)

Process-Injection/apc_queue_inject_new/Cargo.lock

Lines changed: 32 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Process-Injection/apc_queue_inject_new/README.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,6 @@ This code is for educational purposes only. Do not use this code for malicious p
77

88
## Requirements
99
- Rust
10-
- Windows OS
11-
- Administrative privileges (for process injection)
1210

1311
## Building
1412
```bash
@@ -18,4 +16,7 @@ cargo build
1816
## Usage
1917
```bash
2018
cargo run
21-
```
19+
```
20+
21+
## Download PoC
22+
[Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Process-Injection/apc_queue_inject_new)

Process-Injection/apc_queue_injection/Cargo.lock

Lines changed: 32 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Process-Injection/apc_queue_injection/README.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,6 @@ This code is for educational purposes only. Do not use this code for malicious p
77

88
## Requirements
99
- Rust
10-
- Windows OS
11-
- Administrative privileges (for process injection)
1210

1311
## Building
1412
```bash
@@ -18,4 +16,7 @@ cargo build
1816
## Usage
1917
```bash
2018
cargo run
21-
```
19+
```
20+
21+
## Download PoC
22+
[Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Process-Injection/apc_queue_injection)

Process-Injection/early_bird_apc_injection/Cargo.lock

Lines changed: 32 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Process-Injection/early_bird_apc_injection/README.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,6 @@ This code is for educational purposes only. Do not use this code for malicious p
77

88
## Requirements
99
- Rust
10-
- Windows OS
11-
- Administrative privileges (for process injection)
1210

1311
## Building
1412
```bash
@@ -18,4 +16,7 @@ cargo build
1816
## Usage
1917
```bash
2018
cargo run
21-
```
19+
```
20+
21+
## Download PoC
22+
[Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Process-Injection/early_bird_apc_injection)

Process-Injection/inject_on_localprocess/Cargo.lock

Lines changed: 32 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Process-Injection/inject_on_localprocess/README.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,6 @@ This code is for educational purposes only. Do not use this code for malicious p
77

88
## Requirements
99
- Rust
10-
- Windows OS
11-
- Administrative privileges (for process injection)
1210

1311
## Building
1412
```bash
@@ -18,4 +16,7 @@ cargo build
1816
## Usage
1917
```bash
2018
cargo run
21-
```
19+
```
20+
21+
## Download PoC
22+
[Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Process-Injection/inject_on_localprocess)

Process-Injection/inject_on_remoteprocess/README.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,6 @@ This code is for educational purposes only. Do not use this code for malicious p
77

88
## Requirements
99
- Rust
10-
- Windows OS
11-
- Administrative privileges (for process injection)
1210
- Network access to target machine
1311

1412
## Building
@@ -19,4 +17,7 @@ cargo build
1917
## Usage
2018
```bash
2119
cargo run
22-
```
20+
```
21+
22+
## Download PoC
23+
[Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Process-Injection/inject_on_remoteprocess)

0 commit comments

Comments
 (0)