Visit https://github.com/0x80000000/winexec for the newer version of this library (removed a couple features, and added more hooking options). I'm planning on expanding this project alot more.
Process Features |
---|
Kill a process |
Check if a process exists |
Fetch the PID of a process |
Injection Techniques |
---|
APC Code Injection |
Classic DLL Injection |
DLL Injection via Thread Hijacking |
Miscellaneous Features |
---|
Checking for 32bit or 64bit Windows |
Checking for little-endian or big-endian |
Shellcode Execution Techniques |
---|
Shellcode Execution (ASM) |
Classic Shellcode Execution |
Shellcode Execution via RemoteThread |
Shellcode Execution via Windows Fibers |
Regular Shellcode Execution (No Windows API) |
-
How to use Process functions:
- Checking if a process exists
GetProcess().Execute(char *proc);
Parameters: (process name) - Killing a process
KillProc().Execute(int pid);
Parameters: (process ID) - Fetching the PID of a process
GetPID().Execute(char *proc);
Parameters: (process name)
- Checking if a process exists
-
How to use functions classifed under
misc
:- Checking for 32bit or 64bit Windows
IsWin64().Execute();
Parameters: (none) - Checking for little-endian or big-endian
GetEndian().Execute()
Parameters: (none)
- Checking for 32bit or 64bit Windows
-
How to use DLL/Code Injection functions:
- Classic DLL Injection
DllInject().Execute(int pid, wchar_t p_dll);
Parameters: (process ID, DLL) - DLL via Thread Hijacking
TInjection().Execute(int pid, char *s);
Parameters: (process ID, shellcode) - APC Code Injection
APCInjection().Execute(char *s, char *proc_name);
Parameters: (shellcode, process name)
- Classic DLL Injection
-
How to use Shellcode Exeuction functions:
- Shellcode Execution (ASM)
ASMShellcodeExecution().Execute();
Parameters: (none) | Go toincludes/shellcode/asm.hpp
to edit in your own custom shellcode! - Classic Shellcode Execution
LocalShellcodeExecution().Execute(char *code);
Parameters: (shellcode) - Shellcode Execution via Windows Fibers
FiberShellcodeExecution().Execute(char *s);
Parameters: (shellcode) - Shellcode Execution via RemoteThread
RemoteProcessShellcodeExecution().Execute(char *code);
Parameters: (shellcode) - Regular Shellcode Execution (No Windows API)
ExecuteShellCodeNoAPI().Execute(char *shellcode);
Parameters: (shellcode)
- Shellcode Execution (ASM)
Steps for compiling & running:
compile.bat
g++ -o <binary> <source_file> syringe.dll
https://github.com/0x1CA3