Windows-Process-Injection
Windows-Process-Injection copied to clipboard
Some simple process injection techniques targeting the Windows platform
Windows Process Injection
Some simple and unoriginal process injection techniques targeting the Windows platform
Based off the first four entries in this Endgame blogpost which provides good background on the following techniques:
- Classic DLL injection
- PE injection
- Process hollowing
- Thread hijacking
Written in C, error handling has been removed for brevity. Uses documented WinAPI functions where possible for simplicity, as opposed to more esoteric ones favoured by malware authors. Tested using Visual Studio 2017 on Windows 10 Pro v1703 build 15063.483 only for 64bit builds.
A quick way to test these techniques out is to write a small console application that prints a message every 5 seconds to ensure it hasn't crashed. Use this as your injection target.
For educational purposes only e.t.c.