Skip to content

Commit 490608c

Browse files
authored
"updated references"
1 parent a523f7a commit 490608c

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed

README.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3,3 +3,28 @@
33
To setup the environment, please refer this : https://docs.google.com/document/d/1bNrSDWy-Yc3as2ZlvB_X3XOICUjbGUaKkw9PHDvxNAo
44

55
![This is an image](Untitled-1.jpg)
6+
7+
## Tools Used $$
8+
PE bear: https://github.com/hasherezade/pe-bear-releases
9+
CFF Explorer: https://ntcore.com/?page_id=388
10+
Visual Studio 2022: https://visualstudio.microsoft.com/vs/community/
11+
12+
# References
13+
1. APC Code Injection
14+
https://www.ired.team/offensive-security/code-injection-process-injection/apc-queue-code-injection
15+
2. Module Stomping
16+
https://blog.f-secure.com/hiding-malicious-code-with-module-stomping/
17+
https://github.com/countercept/ModuleStomping
18+
3. Process Hollowing
19+
https://github.com/m0n0ph1/Process-Hollowing
20+
4. Process Doppelganging
21+
https://github.com/3gstudent/Inject-dll-by-Process-Doppelganging
22+
https://hshrzd.wordpress.com/2017/12/18/process-doppelganging-a-new-way-to-impersonate-a-process/
23+
5. Transacted Hollowing
24+
https://github.com/hasherezade/transacted_hollowing
25+
6. Process Herpaderping
26+
https://jxy-s.github.io/herpaderping/
27+
https://github.com/jxy-s/herpaderping
28+
7. Process Ghosting
29+
https://www.elastic.co/blog/process-ghosting-a-new-executable-image-tampering-attack
30+
https://github.com/hasherezade/process_ghosting

0 commit comments

Comments
 (0)