Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ccob/threadlessinject
Threadless Process Injection using remote function hooking.
https://github.com/ccob/threadlessinject
Last synced: 4 days ago
JSON representation
Threadless Process Injection using remote function hooking.
- Host: GitHub
- URL: https://github.com/ccob/threadlessinject
- Owner: CCob
- License: mit
- Created: 2023-02-05T13:50:15.000Z (almost 2 years ago)
- Default Branch: master
- Last Pushed: 2024-09-04T17:11:58.000Z (2 months ago)
- Last Synced: 2024-09-06T00:18:19.360Z (2 months ago)
- Language: C#
- Size: 5.49 MB
- Stars: 707
- Watchers: 9
- Forks: 80
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE.txt
Awesome Lists containing this project
README
# Threadless Process Injection
From my Bsides Cymru 2023 talk: **[Needles Without the Thread](https://pretalx.com/bsides-cymru-2023-2022/talk/BNC8W3/)**.
> As red teamers, we always find ourselves in a cat and mouse game with the blue team. Many Anti-virus and EDR solutions over the past 10 years have become significantly more advanced at detecting fileless malware activity in a generic way.
>
> Process injection, a technique used for executing code from within the address space of another process is a common method within the offensive operator’s toolbox. Commonly used to mask activity within legitimate processes such as browsers and instant messaging clients already running on the target workstation.
>
> Within the last 2 years, tools such as Sysmon have added new detections and events for process injection along with big improvements in detections within commercial EDR space.
> With this in mind, a new method of injection was researched that would not fall foul to the traditional methods that are often detected today.## Possible Improvements
- [x] Use more covert allocation and write primitives.
- [ ] Use patchless hooking via debugger attachment and hardware breakpoints [(https://www.pentestpartners.com/security-blog/patchless-amsi-bypass-using-sharpblock)](https://www.pentestpartners.com/security-blog/patchless-amsi-bypass-using-sharpblock/).
- [ ] Avoid RWX on hooked function. Hook assembly will need to handle VirtualProtect calls.
- [ ] Support any DLL via remote module enumeration.