A WIP framework for post exploitation, malware research, learning win32 and the native api, and more.
I have created a number of other .md
files that propose various classes and functions.
- Partial implementation of memory and process classes. Users can quickly search for processes, scan their memory, and do basic DLL injection.
- Implementation of a few anti-debug techniques in the antidebug class.
The goal of this framework is for people to be able to do things like below.
#include "framework.h"
int main() {
Process notepad = Memory::GetProcessByName("notepad.exe");
Memory::GetDebugPrivileges();
notepad.InjectDLL(DLL("PATH TO DLL"));
if (AntiDebug::CheckIsDebuggerPresent())
std::cout << "FOUND DEBUGGER\n";
else
std::cout << "No debugger found\n";
}
As the framework nears completion, it could be used for various projects like:
- A challenge binary for anti-debugging techniques
- Build more advanced meterpreter
- Research which injection techniques are reliable and stealthy, evaluate against different anti-virus products
- Usable for advanced game hacking
- Extreme anti-debugging techniques (more in anti-debugging.md)
- Large list of malware sample source code: github.com/RamadhanAmizudin/malware
- Interesting techniques in Springer "An emerging threat Fileless malware"