You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
当前项目子目录中的代码均为测试过可成功编译且功能正常
The code in the current project subdirectory has all been tested and found to be successfully compilable and functioning properly.
01-DLL-Hijacking
# has read
【HijackLibs】https://hijacklibs.net/
【DLL Sideloading for Initial Access – Red Team Operator's Guide】https://print3m.github.io/blog/dll-sideloading-for-initial-access
# to read
https://www.r-tec.net/r-tec-blog-dll-sideloading.html
02-Function-Address-Locate
# has read
https://github.com/LloydLabs/Windows-API-Hashing/
# to read
https://github.com/Teach2Breach/stargate/blob/main/blog.md
https://mp.weixin.qq.com/s/O4LCnC_DjzfvnLvgXm1bFQ
# to read
https://github.com/EvilBytecode/Ebyte-AMSI-ProxyInjector
https://www.r-tec.net/r-tec-blog-bypass-amsi-in-2025.html
05-Allocate-Write-Execute
# has read
【Thread Name-Calling – using Thread Name for offense】https://research.checkpoint.com/2024/thread-name-calling-using-thread-name-for-offense/
# to read
https://research.checkpoint.com/2025/waiting-thread-hijacking/
https://github.com/thomasxm/BOAZ_beta
https://blog.malicious.group/writing-your-own-rdi-srdi-loader-using-c-and-asm/
https://github.com/Friends-Security/RedirectThread
https://github.com/NUL0x4C/AtomLdr
https://github.com/kyleavery/AceLdr
https://github.com/oldboy21/SWAPPALA
https://oldboy21.github.io/posts/2024/09/timer-callbacks-spoofing-to-improve-your-sleap-and-swappala-untold/
06-Remote-Inject
# has read
【深入理解 Windows 进程属性:从 PPID 欺骗到句柄继承】https://mp.weixin.qq.com/s/-0MbfIWFnpUD2P4IZRBrkQ
# to read
https://repnz.github.io/posts/apc/user-apc/
https://repnz.github.io/posts/apc/kernel-user-apc-api/
https://repnz.github.io/posts/apc/wow64-user-apc/
https://github.com/repnz/apc-research
https://bruteratel.com/research/2024/10/20/Exception-Junction/
https://github.com/passthehashbrowns/VectoredExceptionHandling
https://www.malwaretech.com/2024/02/bypassing-edrs-with-edr-preload.html
https://www.outflank.nl/blog/2024/10/15/introducing-early-cascade-injection-from-windows-process-creation-to-stealthy-injection/
https://github.com/MalwareTech/EDR-Preloader
https://github.com/rad9800/hwbp4mw
07-Sleep-Mask
# to read
https://www.blackhillsinfosec.com/avoiding-memory-scanners/
https://github.com/mgeeky/ShellcodeFluctuation
08-Code-Obfuscation
# to read
【Themida】https://www.oreans.com/Themida.php
【VMProtect】https://vmpsoft.com/
https://github.com/KomiMoe/Arkari
https://github.com/obfuscator-llvm/obfuscator
https://github.com/rasta-mouse/ThreatCheck
https://github.com/dobin/avred