Process Injection using Thread Name
-
Updated
Apr 18, 2025 - C
Process Injection using Thread Name
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection.
Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread
A flexible PE loader, loading module in memory. Most of the functions can be inline, compatible for shellcode.
Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks
Various methods of executing shellcode
A collection of PoCs for different injection techniques on Windows!
-x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.
PoC arbitrary WPM without a process handle
Collection of shellcode injection and execution techniques
PoC shellcode injector using clean syscalls to bypass user-mode hooks in ntdll.dll
drx ptrace shellcode injector
Various dll hollowing techniques
You should look through my Assembly LearningRepo first before learning Shellcoding.
A server for testing shellcode injection over a buffer overflow
PoC implementation of the GhostWriting injection technique for x64 Windows
Early Bird Injector x64 , x86
Trojan that uses direct System Calls to inject shellcode into a target process, undetected by Windows Defender & Bitdefender
Collection of Thread Hijacking malware with different techniques, some of them undetected by Windows Defender
C based shellcode injection program/library
Add a description, image, and links to the shellcode-injection topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-injection topic, visit your repo's landing page and select "manage topics."