Evilbytecode-Shellcode-Go-Tactics

A mutliple tactics to execute shellcode in go :}

MIT License

Stars
13

Evilbytecode Shellcode Execution Tactics

This repository contains various projects that demonstrate advanced techniques for executing shellcode and performing memory manipulation.

Features

  • APC Injection Exploits the Asynchronous Procedure Call (APC) technique to execute malicious code within target processes.

  • Early Bird APC Injection A variation of APC Injection focusing on executing code before the main process starts.

  • Local Mapping Injection Demonstrates malicious code injection via memory mapping into local processes.

  • Local Payload Execution Addresses the direct execution of malicious payloads in a system's local environment.

  • Payload Execution Fibers Demonstrates running shellcode using Fibers, a type of lightweight thread.

  • Payload Placement Shows how to store shellcode in the .text section of a process and execute it.

  • Process Injection (Shellcode) Exploits shellcode injection directly into running processes to control or execute malicious tasks.

  • Registry Shellcode Demonstrates writing and reading shellcode to/from the Windows Registry.

  • Remote Function Stomping Injection Exploits the substitution of functions in remote systems to carry out malicious activities.

  • Remote Mapping Injection Demonstrates malicious code injection via memory mapping into remote processes.

  • Remote Thread Hijacking Focuses on hijacking threads in remote system processes to execute malicious code.

  • Threadless Injection Demonstrates threadless injection using Go & C, where shellcode is injected without creating a new thread.

Contributing

Contributions are welcome! If you have improvements or additional techniques to add, please fork the repository and submit a pull request. Ensure your code follows the project's coding standards and includes relevant documentation.

License

This repository is licensed under the MIT License. See the LICENSE file for more details.

Disclaimer

This repository is intended for educational purposes only. The techniques demonstrated here are for understanding security vulnerabilities and enhancing defensive measures. Unauthorized use of these techniques may have legal consequences.


Package Rankings
Top 6.41% on Proxy.golang.org
Related Projects