{"id":23421571,"url":"https://github.com/evilbytecode/ppid-spoofing","last_synced_at":"2025-06-29T17:06:46.741Z","repository":{"id":245078823,"uuid":"817196716","full_name":"EvilBytecode/PPID-Spoofing","owner":"EvilBytecode","description":"Parent Process ID Spoofing, coded in CGo.","archived":false,"fork":false,"pushed_at":"2024-06-27T06:44:05.000Z","size":4,"stargazers_count":22,"open_issues_count":0,"forks_count":5,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-26T08:37:31.826Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EvilBytecode.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-06-19T08:04:07.000Z","updated_at":"2024-12-26T09:43:26.000Z","dependencies_parsed_at":"2024-12-23T02:16:15.041Z","dependency_job_id":"bd75a072-6037-4935-bf95-1f3f19643fcb","html_url":"https://github.com/EvilBytecode/PPID-Spoofing","commit_stats":null,"previous_names":["evilbytecode/ppid-spoofing"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPPID-Spoofing","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPPID-Spoofing/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPPID-Spoofing/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FPPID-Spoofing/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EvilBytecode","download_url":"https://codeload.github.com/EvilBytecode/PPID-Spoofing/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248578864,"owners_count":21127713,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-12-23T02:16:04.629Z","updated_at":"2025-06-29T17:06:46.730Z","avatar_url":"https://github.com/EvilBytecode.png","language":"Go","readme":"# Parent PID spoofing\n\u003ca href=\"https://t.me/pulzetools\"\u003e\u003cimg src=\"https://img.shields.io/badge/Join%20my%20Telegram%20group-2CA5E0?style=for-the-badge\u0026logo=telegram\u0026labelColor=db44ad\u0026color=5e2775\"\u003e\u003c/a\u003e\n\n- This is a simple method to bypass malicious behavior detections based on parent-child process relationship. Usually when an application starts another executable, the new process has a parent PID assigned which indicates the process that created it. This allows to detect and possibly block malicious intents like for example ```Word/Excel``` application starting ```Powershell```. This technique may be combined with for example process hollowing to achieve more stealth.\n\n- The great thing is that ```CreateProcess``` API lets you provide additional information for process creation, including the one called ```PROC_THREAD_ATTRIBUTE_PARENT_PROCESS```. Let’s see how to use it - we will create a ```Notepad``` process in a way that it will look like it was spawned by ```explorer.exe```\n\n\n## License\nThis project is licensed under the MIT License. See the LICENSE file for details.","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fppid-spoofing","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fevilbytecode%2Fppid-spoofing","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fppid-spoofing/lists"}