https://github.com/riskydissonance/ridgway
A quick tool for hiding a new process running shellcode.
https://github.com/riskydissonance/ridgway
process-manipulation shellcode
Last synced: 9 months ago
JSON representation
A quick tool for hiding a new process running shellcode.
- Host: GitHub
- URL: https://github.com/riskydissonance/ridgway
- Owner: riskydissonance
- Created: 2019-01-30T22:07:04.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2020-06-10T13:30:57.000Z (almost 6 years ago)
- Last Synced: 2025-07-07T18:14:46.219Z (9 months ago)
- Topics: process-manipulation, shellcode
- Language: C++
- Homepage:
- Size: 22.5 KB
- Stars: 57
- Watchers: 4
- Forks: 14
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Ridgway
A quick tool for hiding a new process running shellcode.
Not sure it adds much value compared to just migrating into an existing process, was more of an exercise for learning C++ and playing with the Windows APIs.
## What's it do?
It will create an instance of the given process and set that process' parent to that of the ID passed in, helping hide the process.
It will then inject some shellcode (hard coded so change before compiling) into that process, using a few different methods.
## Usage
`Ridgway.exe `
Without arguments the binary uses C:\Program Files (x86)\Internet Explorer\iexplore.exe and uses explorer.exe as the parent.
### Example
`Ridgway.exe C:\Windows\syswow64\notepad.exe 1337`
## Cobalt Strike
There's an aggressor script **artifact.cna** which can be loaded into Cobalt Strike so that the generated Windows Executables use this executable.
Note you need to keep the default shellcode of 'A's, and may need to change the path to the **encoded_payload.sh** script in the artifact.cna.
## Name
For those interested it's named after Stan Ridgway, who sang [this belter](https://www.youtube.com/watch?v=VgRXdozljRs), as that's exactly what we're trying to do here.