Skip to content

Commit 067ffc6

Browse files
authored
Merge pull request #163 from frack113/version-1-2
Version 1.2.0
2 parents f610462 + 5ebd382 commit 067ffc6

File tree

17 files changed

+191
-42
lines changed

17 files changed

+191
-42
lines changed

.github/workflows/release.yaml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,14 +22,16 @@ jobs:
2222
- name: Install git-cliff
2323
uses: taiki-e/install-action@git-cliff
2424
- name: Generate changelog
25-
run: git-cliff -o
25+
run: git-cliff --latest -o
2626
- name: Release project
2727
uses: softprops/action-gh-release@v2
2828
with:
2929
body_path: CHANGELOG.md
3030
crates-io:
3131
name: Publish to crates.io
3232
runs-on: windows-latest
33+
env:
34+
CARGO_REGISTRY_TOKEN: ${{ secrets.CARGO_REGISTRY_TOKEN }}
3335
steps:
3436
- name: Checkout code
3537
uses: actions/checkout@v6
@@ -40,5 +42,4 @@ jobs:
4042
- name: Publish the crate
4143
run: |-
4244
cargo publish `
43-
--token ${{ secrets.CARGO_REGISTRY_TOKEN }} `
4445
--all-features

Cargo.lock

Lines changed: 29 additions & 29 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Cargo.toml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
[package]
66
name = "malware-traces-generator"
7-
version = "1.1.0"
7+
version = "1.2.0"
88
edition = "2024"
99
rust-version = "1.85.0"
1010
description = "Generate malware traces for detection tests"
@@ -30,6 +30,7 @@ windows = { version = "0.62.2", features = [
3030
"Win32_System_Services",
3131
"Win32_System_Diagnostics_ToolHelp",
3232
"Win32_System_Threading",
33+
"Win32_System_LibraryLoader",
3334
] }
3435

3536
clap = { version = "4.5.54", features = ["derive"] }

cliff.toml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,11 +55,11 @@ postprocessors = [
5555

5656
[git]
5757
conventional_commits = true
58-
filter_unconventional = true
58+
filter_unconventional = false
5959
split_commits = false
6060
commit_preprocessors = [
6161
{ pattern = '\((\w+\s)?#([0-9]+)\)', replace = "([#${2}](<REPO>/issues/${2}))" },
62-
{ pattern = '.*', replace_command = 'typos --write-changes -' },
62+
{ pattern = '.*', replace_command = 'typos --write-changes - || cat' },
6363
]
6464
commit_parsers = [
6565
{ message = "^feat", group = "<!-- 0 -->✨ Features" },

docs/generation-file.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,8 @@ name = "frack113"
132132

133133
##### :email: Email
134134

135-
This field is optional. Use it when you want to provide an email address for an author.
135+
This field is optional. Use it when you want to provide an email address for an
136+
author.
136137

137138
```toml
138139
[[metadata.authors]]

docs/installation.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ SPDX-FileCopyrightText: 2023 The MalwareTracesGenerator development team
44
SPDX-License-Identifier: GPL-3.0-or-later
55
-->
66

7+
<!-- markdownlint-disable code-block-style -->
8+
79
Before we get into how to use it, we first need to install our tool. There are a
810
few ways to do that.
911

docs/traces/drivers/byovd.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ using vulnerable legitimate drivers to hide or even remove security control syst
2020

2121
<!-- markdownlint-disable line-length -->
2222
```sh
23-
mtg traces drivers byovd C:/temp/a360ec883ef5383157080b2e185802ef.bin SeasunProtect loldrivers
23+
mtg traces drivers byovd C:\\temp\\a360ec883ef5383157080b2e185802ef.bin SeasunProtect loldrivers
2424
```
2525
<!-- markdownlint-enable line-length -->
2626

docs/traces/files/browser.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,8 @@ SPDX-License-Identifier: GPL-3.0-or-later
66

77
# :globe_with_meridians: Browser Info-Stealer
88

9-
Browser info-stealer traces simulate the behavior of malware that targets browser data to steal sensitive information, such as saved passwords and cookies.
9+
Browser info-stealer traces simulate the behavior of malware that targets
10+
browser data to steal sensitive information, such as saved passwords and cookies.
1011

1112
## :link: Technical links
1213

docs/traces/index.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ Let's start with what a trace is:
2727
- [Spoofing a parent process identifier][ppid spoofing]
2828
- [Browser info-stealer][browser]
2929
- [Loading a vulnerable driver][byovd]
30+
- [Load a vulnerable dll][dll]
3031

3132
Now, let's look at what it isn't:
3233

@@ -40,3 +41,4 @@ Now, let's look at what it isn't:
4041
[ppid spoofing]: ./processes/spoofing.md
4142
[browser]: ./files/browser.md
4243
[byovd]: ./drivers/byovd.md
44+
[dll]: ./memory/dll.md

docs/traces/memory/dll.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
<!--
2+
SPDX-FileCopyrightText: 2023 The MalwareTracesGenerator development team
3+
4+
SPDX-License-Identifier: GPL-3.0-or-later
5+
-->
6+
7+
# :globe_with_meridians: Dll loader
8+
9+
Dll loader traces simulate the behavior of malware that use DLL Sideloading.
10+
11+
## :link: Technical links
12+
13+
- [Hijack Execution Flow: DLL](https://attack.mitre.org/techniques/T1574/001/)
14+
15+
## :teacher: Usage
16+
17+
### :keyboard: CLI
18+
19+
<!-- markdownlint-disable line-length -->
20+
```sh
21+
mtg traces memory dll-loader C:\\rust\\wininet.dll
22+
```
23+
<!-- markdownlint-enable line-length -->
24+
25+
### :page_facing_up: File configuration
26+
27+
```toml
28+
[[traces]]
29+
[traces.dll_loader]
30+
path = "C:\\rust\\wininet.dll"
31+
description = "Simulate side loading of wininet.dll "
32+
```

0 commit comments

Comments
 (0)