We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 1a065e6 commit 277540aCopy full SHA for 277540a
load-code/shellcode/execute-shellcode-via-windows-callback-function.yml
@@ -20,6 +20,7 @@ rule:
20
- http://ropgadget.com/posts/abusing_win_functions.html
21
- https://github.com/aahmad097/AlternativeShellcodeExec/
22
- https://osandamalith.com/2021/04/01/executing-shellcode-via-callbacks/
23
+ - https://github.com/tlsbollei/Malware-Training/blob/main/Code%20Injection/LdrCallEnclave.cpp
24
examples:
25
- 10cd7afd580ee9c222b0a87ff241d306:0x10008BE0
26
- 268d61837aa248c1d49a973612a129ce:0x1000CEC0
@@ -78,6 +79,7 @@ rule:
78
79
- api: EnumerateLoadedModules
80
- api: GrayString
81
- api: ImmEnumInputContext
82
+ - api: LdrCallEnclave
83
- api: LineDDA
84
- and:
85
- api: SymInitialize
0 commit comments