Skip to content

This program is designed to demonstrate various process injection techniques

License

Notifications You must be signed in to change notification settings

Invoke-Mimikatz/ProcessInjection

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

48 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ProcessInjection


The program is designed to perform process injection. Currently the tool supports 4 process injection techniques.

1) Vanilla Process Injection
2) DLL Injection
3) Process Hollowing
4) APC Queue
5) Dynamic Invoke - Vanilla Process Injection

The tool accepts shellcode in 4 formats.

1) base64
2) hex
3) c
4) raw

Supports 3 detection evading techniques.

1) Parent PID Spoofing

Encryption
2) XOR Encryption (It can also be used with Parent PID Spoofing technique but can't be used with DLL Injection Technique)
3) AES Encryption (It can also be used with Parent PID Spoofing technique but can't be used with DLL Injection Technique)

Command Line Usage

Usage           Description
-----           -----------
/t              Specify the process injection technique id.
                1 = Vanilla Process Injection
                2 = DLL Injection
                3 = Process Hollowing
                4 = APC Queue Injection
/f              Specify the format of the shellcode
                base64
                hex
                c
                raw
/pid            Specify the process id
/parentproc     Specify the parent process name
/path           Specify the path of the file that contains the shellcode
/ppath          Specify the path of the executable that will be spawned (Mandatory while using /parentproc argument)
/url            Specify the url where the shellcode is hosted
/enc            Specify the encryption type (aes or xor) in which the shellcode is encrypted
/key            Specify the key that will be used to decrypt the shellcode.
/help           Show help

Blog Post

https://3xpl01tc0d3r.blogspot.com/2019/08/process-injection-part-i.html

https://3xpl01tc0d3r.blogspot.com/2019/09/process-injection-part-ii.html

https://3xpl01tc0d3r.blogspot.com/2019/10/process-injection-part-iii.html

https://medium.com/@r3n_hat/parent-pid-spoofing-b0b17317168e

https://3xpl01tc0d3r.blogspot.com/2019/12/process-injection-part-v.html

https://3xpl01tc0d3r.blogspot.com/2020/08/process-injection-tool-updates.html

Contribution Credit

Renos

Credits also goes to :

Aaron Bray & Rasta Mouse for Process Hollowing code

The Wover & b33f for Dynamic Invoke - (https://thewover.github.io/Dynamic-Invoke/)

About

This program is designed to demonstrate various process injection techniques

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C# 100.0%