Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.
This technique is finding RWX region in already running processes in this case OneDrive.exe and Write shellcode into that region and execute it without calling VirtualProtect, VirtualAllocEx, VirtualAlloc.
Just compile the program and run the (EXE) without any paremeter.
This technique will work with ntdll based shellcode which is not dependent on any section. I used to generate my shellcode.
Limbo is an ambitious project aimed at reimagining SQLite, the widely-used embedded database, by rewriting…
Typst is a modern, markup-based typesetting system designed to combine the power of LaTeX with…
The msuserstats tool is a robust PowerShell-based solution designed to streamline user account management in…
Cube is a powerful semantic layer designed to streamline the process of building data applications…
Iced is a cross-platform GUI library for Rust, designed with a focus on simplicity and…
MEGR-APT is an advanced and scalable system designed for hunting Advanced Persistent Threats (APTs) by…