Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/secrary/InjectProc
InjectProc - Process Injection Techniques [This project is not maintained anymore]
https://github.com/secrary/InjectProc
Last synced: 3 months ago
JSON representation
InjectProc - Process Injection Techniques [This project is not maintained anymore]
- Host: GitHub
- URL: https://github.com/secrary/InjectProc
- Owner: secrary
- License: gpl-3.0
- Created: 2017-05-26T08:08:20.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2019-02-10T11:05:15.000Z (over 5 years ago)
- Last Synced: 2024-04-12T19:38:56.605Z (7 months ago)
- Language: C++
- Homepage:
- Size: 69.3 KB
- Stars: 987
- Watchers: 67
- Forks: 225
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - secrary/InjectProc - InjectProc - Process Injection Techniques [This project is not maintained anymore] (C++)
README
# InjectProc
Process injection is a very popular method to hide malicious behavior of code and are heavily used by malware authors.
There are several techniques, which are commonly used:
DLL injection, process replacement (a.k.a process hollowing), hook injection and APC injection.Most of them use same Windows API functions:
OpenProcess, VirtualAllocEx, WriteProcessMemory, for detailed information about those functions, use MSDN.## DLL injection:
* Open target process.
* Allocate space.
* Write code into the remote process.
* Execute the remote code.## Process replacement:
* Create target process and suspend it.
* Unmap from memory.
* Allocate space.
* Write headers and sections into the remote process.
* Resume remote thread.## Hook injection:
* Find/Create process.
* Set hook
## Note:
`InjectProc` uses [SetWindowsHookEx](https://msdn.microsoft.com/en-us/library/windows/desktop/ms644990(v=vs.85).aspx) function, you can try different ways to installing hooks, for example, [EasyHook](http://easyhook.github.io/tutorials/nativeremotehook.html)## APC injection:
* Open process.
* Allocate space.
* Write code into remote threads.
* "Execute" threads using QueueUserAPC.## Download
[Windows x64 binary](https://github.com/secrary/InjectProc/releases) - x64 bit DEMO
## Dependencies:
[vc_redist.x64](https://support.microsoft.com/en-us/help/2977003/the-latest-supported-visual-c-downloads) - Microsoft Visual C++ Redistributable
## DEMO
[InjectProc DEMO - Process Injection Techniques](https://www.youtube.com/watch?v=hLPDq9nSHMw)## Contributors
- [nullbites](https://github.com/nullbites)# Warning
Works on Windows 10 build 1703, 64bit.I've not enough time to test other systems and make it portable if you have enough time please contribute.
I create this project for me to better understand how process injection works and
I think it will be helpful for many beginner malware analysts too.