Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/yekuuun/maldev

Base code samples & snippets i wrote for maldev programming learning journey - Work in progress... 🛠️
https://github.com/yekuuun/maldev

c cpp learning malware windows

Last synced: about 2 months ago
JSON representation

Base code samples & snippets i wrote for maldev programming learning journey - Work in progress... 🛠️

Awesome Lists containing this project

README

        

```C
_____ ______ ________ ___ ________ _______ ___ ___
|\ _ \ _ \|\ __ \|\ \ |\ ___ \|\ ___ \ |\ \ / /|
\ \ \\\__\ \ \ \ \|\ \ \ \ \ \ \_|\ \ \ __/|\ \ \ / / /
\ \ \\|__| \ \ \ __ \ \ \ \ \ \ \\ \ \ \_|/_\ \ \/ / /
\ \ \ \ \ \ \ \ \ \ \ \____\ \ \_\\ \ \ \_|\ \ \ / /
\ \__\ \ \__\ \__\ \__\ \_______\ \_______\ \_______\ \__/ /
\|__| \|__|\|__|\|__|\|_______|\|_______|\|_______|\|__|/

-------base code samples for malware dev------

```

> [!Important]
This repository was created due to my interest for malware development. I consider myself as a beginner and you may be surprised for some code samples. some code are duplicated in single cases such for payload encryption. The purpose is to speak about several subjects I dive into with maldev academy learning ressources -> Maldev academy

## You'll find :

### Utils :

- `PrintHex` : Printing hex data clean
- `String` : base & usefull string manipulation functions

### Maldev :

**Payload Encryption**
- `XOR`
- `Rc4 (base)`
- `Rc4 (using SystemFunc032)`
- `ChaCha20`

**Obfuscation**
- `Ipv4 obfuscation` : Obfuscate payload using ipv4 formats + deobfuscation
- `String hashing` : Base hashing techniques for strings.

**Shellcode Injections**
- `BaseInject` : Base shellcode injection using classic WinAPI functions (x64 payload)
- `NTInject` : Base shellcode injection using NTAPI (x64 payload)

**Thread Hijacking**
- `LocalHijack` : Base locale thread hijacking (x64 calc payload)
- `RemoteHijack` : Base thread hijacking using SUSPENDED_PROCESS (x64 payload)

**APC Injection**
- `Local APC Inject` : Base APC injection in current running process (x64 payload)
- `Early Bird APC Inject` : Base remote APC injection (target process with x64 payload)

**Mapping Injection**
- `Local mapping injection` : Base payload injection using local mapping method (x64 payload)
- `Remote mapping injection` : Base remote mapping injection with x64 payload (using MapViewOfFile3)

**Spoofing**
- `PPid spoofing` : Base PPid spoofing (POC) spoof other process PID for new process creation

**PE**
- `Parser` : Base code sample for how to parse a PE file & display informations about it.

**Custom WINAPI**
- `GetModuleHandleW` : Custom implementation of GetModuleHandleW( ) - no imports
- `GetProcAddress` : Custom implementation of GetProcAddress( ) - no imports

> [!Note]
> Consider using hashing techniques inside of GetProcAddress avoiding usage of raw strings params in custom GetModuleHandleW & GetProcAddress calls by using hash comparison method

**Work in progress...** 🛠️

---

> [!Warning]
> This repository was made for learning purpose.

---

### Thanks to :

- Maldev Academy
- Hasherezade