v x

Invisible Text. Fuck you.

Home Archive Code Windows Papers Linux Papers AV Tech Papers Other Papers Malware Samples APT Collection

Process Injection

Process Injection Part V: APC Process Injection by 3xpl01tc0d3r
APC Queue Code Injection by Spot the Planet Windows Process Injection: Asynchronous Procedure Call (APC) by ModExp
Queue User APC to Alertable Thread by The CIA
Win32 Callback Injection: EnumChildWindows by Dreamer && Clover
Win32 Callback Injection: EnumDateFormatsA by Dreamer && Clover
Win32 Callback Injection: EnumDesktopW by Dreamer && Clover
Win32 Callback Injection: EnumDesktopWindows by Dreamer && Clover
Win32 Callback Injection: EnumSystemCodePagesA by Dreamer && Clover
Win32 Callback Injection: EnumSystemCodePagesW by Dreamer && Clover
Win32 Callback Injection: EnumSystemGeoID by Dreamer && Clover
Win32 Callback Injection: EnumSystemLanguageGroupsA by Dreamer && Clover
Win32 Callback Injection: EnumSystemLocalesA by Dreamer && Clover
Win32 Callback Injection: EnumThreadWindows by Dreamer && Clover
Win32 Callback Injection: EnumUILanguagesA by Dreamer && Clover
Win32 Callback Injection: EnumWindow by Dreamer && Clover
Masking Malicious Memory Artifacts series Part I: Phantom DLL Hollowing by Forrest Orr
Masking Malicious Memory Artifacts series Part II: Insights from Moneta by Forrest Orr
Masking Malicious Memory Artifacts series Part III: Bypassing Defensive Scanners by Forrest Orr
Process Injection Techniques by Ozan Ünal
Process Injection Techniques used by Malware by Angelystor
The state of advanced code injections by Adalogics.com
Process Injection Techniques - Gotta Catch Them All by Amit Klein && Itzik Kotler
PE Injection: Executing PEs inside Remote Processes by Spot the Planet
PE Injection Explained: Advanced memory code injection technique by Emeric Nasi
PE Injection demonstration [Code] by urstrewly
Weaponize GhostWriting Injection by Petit Sio
Ghostwriting Technique POC by c0de90e7
CTRL + INJECT Paper by Rotem Kerner
Ctrl Inject POC by TheEvilBit
Ctrl Inject POC by SafeBreach Labs
Thread and Process State Change a.k.a.: EDR Hook Evasion Method #4512 by Yarden Shafir
Code Injection using Taskbar (C Code) (ASM code) by x0r19x91
Weaponizing Mapping Injection with Instrumentation Callback for stealthier process injection by Splinter Code
An Alternative Method To Enumerate Processes by smelly__vx
GetEnvironmentVariable alternative to WriteProcessMemory in proc inject by J. M. Fernández
NINA: x64 Process Injection by 0x1337dtm
Abusing Windows’ Implementation of Fork() for Stealthy Memory Operations by Bill Demirkapi

Sponsor

sponsor Tutorial from zetalytics.com

Want to sponsor vx-underground?

Your information could go here