https://github.com/0xvpr/lazy-payload-poc
Lazy "position independent" payload making technique for Windows
https://github.com/0xvpr/lazy-payload-poc
injection payload payload-generator shellcode shellcode-development shellcode-injection
Last synced: 3 months ago
JSON representation
Lazy "position independent" payload making technique for Windows
- Host: GitHub
- URL: https://github.com/0xvpr/lazy-payload-poc
- Owner: 0xvpr
- License: mit
- Created: 2023-06-23T14:49:56.000Z (about 2 years ago)
- Default Branch: main
- Last Pushed: 2024-02-13T02:25:06.000Z (over 1 year ago)
- Last Synced: 2025-02-02T04:24:46.605Z (5 months ago)
- Topics: injection, payload, payload-generator, shellcode, shellcode-development, shellcode-injection
- Language: C
- Homepage:
- Size: 17.6 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
lazy payload poc
# Overview
This is a proof of concept for leveraging the behavior of kernel32 and ntdll kernel loading
in order to write small, executable, shellcode that will run in an arbitrary process.# Demo
[ TODO ]# Building Using Docker (Recommended)
```bash
git clone https://github.com/0xvpr/lazy-payload-poc.git lazy-payload-poc && cd lazy-payload-poc
make docker-container
make docker-build
```