https://github.com/lcsig/pe-infection-malware
PE (Portable Executable) Infection Code in VB.NET
https://github.com/lcsig/pe-infection-malware
code-injection malware-research pe-infection pentration-testing shell-code
Last synced: 6 months ago
JSON representation
PE (Portable Executable) Infection Code in VB.NET
- Host: GitHub
- URL: https://github.com/lcsig/pe-infection-malware
- Owner: lcsig
- License: mit
- Created: 2025-01-18T13:31:09.000Z (12 months ago)
- Default Branch: main
- Last Pushed: 2025-01-18T17:23:18.000Z (12 months ago)
- Last Synced: 2025-06-12T05:05:20.290Z (7 months ago)
- Topics: code-injection, malware-research, pe-infection, pentration-testing, shell-code
- Language: Visual Basic .NET
- Homepage:
- Size: 6.84 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# PE-Infection
PE (Portable Executable) Infection Code in VB.NET
# Code Details
## Explaination
- Load IMAGE_DOS_HEADER
- Load IMAGE_NT_HEADERS
- Load IMAGE_SECTION_HEADER
- Calculate Code Cave Position
- Inject Shellcode and Custom Code
- Modify Entry Point
- Serialize Changes and Return new PE
## Usage
```vb
IO.File.WriteAllBytes(Application.StartupPath & "\injected.exe", Images_Changing.Modify_Linker_Version(IO.File.ReadAllBytes(Application.StartupPath & "\Project1.exe")))
```
## Disclaimer
This code is intended strictly for educational and research purposes. Unauthorized use of this code to create or distribute malicious software is illegal and may result in severe criminal and civil penalties under cybersecurity and anti-malware laws. The authors or publishers do not endorse or condone any misuse of this material.
## Buy me a Coffee:
BTC: bc1q2kqvggm552h0csyr0awa2zepdapxdqnacw0z5w
