Would like to take the magic of a black cat? ε٩(๑> 3 <)۶з
Code samples are provided for educational purposes. Adequate defenses can only be built by researching attack techniques available to malicious actors. Using this code against target systems without prior permission is illegal in most jurisdictions. The authors are not liable for any damages from misuse of this information or code.
and, Don't ask me about creating specific tools using these techniques (I'll ignore them altogether).
I don't want to exploit this, I just want to know how it works just curious, I'm not writing code to attack others.
If you are interested in these, you should know how to use them
If you are interested in this repository, i guess you already know some knowledge.
So I'll leave the code, but I won't explain them all.
First, still under development, it goes slowly.
This repository contains the code I researched and wrote.
I'm not a security technician, I've been researching these for a long time just out of my curiosity.
To protect yourself from attacks, it's much better to know how to attack.
You've played some game. Haven't you ever looked up an enemy to make it easier to clear? No, it's not.
I'm still inexperienced and may have some wrong code and some code that doesn't work.
I think I was a script kiddie when I first learned(?) about these.
I don't know how it works, I checked the tools I downloaded on the web and I thought I was a Hacker.
I can write a little code now, but it may still be a script kiddie. because noob programmer.
So I will investigate these, write code, make them work, and try to understand them... as long as my curiosity continues :3
So, if you can tell me about these, create issues and PRs to grow me♡
Good question, but the answer to this is because I like Rust. That's all.
Do you say that writing in C doesn't change because there is a lot of unsafe code?
Of course. But C is not Rust. That's why I don't write it.
see #Todo section.
i will update that list, when i got other plans, other ideas.
WELCOME ANYTIME
- some UAC bypass (research is almost done, will push the code.)
- hollow (almost. 32->64 and 64->32 are not support for now. i will research it.)
- pe tool (for manupilations, currently, added some function but still WIP :) )
- other 2 or 3 injection methods (yes, for like a crypter)
- create simple crypter ..1
- reverse tcp with e2e connection (done researched)
- create simple rat
- r00t***
-
research c****t s****e(was not interested) - research b***k dll
- w*n hook
- km ..2
.. etc.
1: In fact I started learning for create Crypter, when i was more newbie programmer.
___It's easy to avoid scan time detection, but the runtime detection avoiding is very difficult.
___I've looked at some methods that might avoid runtime detection, but they require a very high level of knowledge.
___But I will work on this after I grow up a little more.
___Because they are part of TODO: 32: low priority. cuz biding is not good for now. but i will work about this in the furute, absolutely.