Advanced-Process-Injection-Workshop
Advanced-Process-Injection-Workshop copied to clipboard
Advanced-Process-Injection-Workshop by CyberWarFare Labs
To setup the environment, please refer this : https://docs.google.com/document/d/1bNrSDWy-Yc3as2ZlvB_X3XOICUjbGUaKkw9PHDvxNAo

Tools Used
PE bear: https://github.com/hasherezade/pe-bear-releases CFF Explorer: https://ntcore.com/?page_id=388 Visual Studio 2022: https://visualstudio.microsoft.com/vs/community/
References
- APC Code Injection https://www.ired.team/offensive-security/code-injection-process-injection/apc-queue-code-injection
- Module Stomping https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/ https://github.com/countercept/ModuleStomping
- Process Hollowing https://github.com/m0n0ph1/Process-Hollowing
- Process Doppelganging https://github.com/3gstudent/Inject-dll-by-Process-Doppelganging https://hshrzd.wordpress.com/2017/12/18/process-doppelganging-a-new-way-to-impersonate-a-process/
- Transacted Hollowing https://github.com/hasherezade/transacted_hollowing
- Process Herpaderping https://jxy-s.github.io/herpaderping/ https://github.com/jxy-s/herpaderping
- Process Ghosting https://www.elastic.co/blog/process-ghosting-a-new-executable-image-tampering-attack https://github.com/hasherezade/process_ghosting