[go: up one dir, main page]

Skip to content

A WIP framework for post exploitation, malware research, learning win32 and the native api, and more.

Notifications You must be signed in to change notification settings

0xchase/unnamed-framework

Repository files navigation

Unnamed Framework

A WIP framework for post exploitation, malware research, learning win32 and the native api, and more.

I have created a number of other .md files that propose various classes and functions.

Current progress

  • Partial implementation of memory and process classes. Users can quickly search for processes, scan their memory, and do basic DLL injection.
  • Implementation of a few anti-debug techniques in the antidebug class.

Example

The goal of this framework is for people to be able to do things like below.

#include "framework.h"

int main() {
    Process notepad = Memory::GetProcessByName("notepad.exe");
    Memory::GetDebugPrivileges();

    notepad.InjectDLL(DLL("PATH TO DLL"));

    if (AntiDebug::CheckIsDebuggerPresent())
        std::cout << "FOUND DEBUGGER\n";
    else
        std::cout << "No debugger found\n";
}

Future projects/research

As the framework nears completion, it could be used for various projects like:

  • A challenge binary for anti-debugging techniques
  • Build more advanced meterpreter
  • Research which injection techniques are reliable and stealthy, evaluate against different anti-virus products
  • Usable for advanced game hacking
  • Extreme anti-debugging techniques (more in anti-debugging.md)

Resources

  • Large list of malware sample source code: github.com/RamadhanAmizudin/malware
  • Interesting techniques in Springer "An emerging threat Fileless malware"

About

A WIP framework for post exploitation, malware research, learning win32 and the native api, and more.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published