Visit https://github.com/0x80000000/winexec for the newer version of this library (removed a couple features, and added more hooking options). I'm planning on expanding this project alot more.
| Process Features |
|---|
| Kill a process |
| Check if a process exists |
| Fetch the PID of a process |
| Injection Techniques |
|---|
| APC Code Injection |
| Classic DLL Injection |
| DLL Injection via Thread Hijacking |
| Miscellaneous Features |
|---|
| Checking for 32bit or 64bit Windows |
| Checking for little-endian or big-endian |
| Shellcode Execution Techniques |
|---|
| Shellcode Execution (ASM) |
| Classic Shellcode Execution |
| Shellcode Execution via RemoteThread |
| Shellcode Execution via Windows Fibers |
| Regular Shellcode Execution (No Windows API) |
-
How to use Process functions:
- Checking if a process exists
GetProcess().Execute(char *proc);Parameters: (process name) - Killing a process
KillProc().Execute(int pid);Parameters: (process ID) - Fetching the PID of a process
GetPID().Execute(char *proc);Parameters: (process name)
- Checking if a process exists
-
How to use functions classifed under
misc:- Checking for 32bit or 64bit Windows
IsWin64().Execute();Parameters: (none) - Checking for little-endian or big-endian
GetEndian().Execute()Parameters: (none)
- Checking for 32bit or 64bit Windows
-
How to use DLL/Code Injection functions:
- Classic DLL Injection
DllInject().Execute(int pid, wchar_t p_dll);Parameters: (process ID, DLL) - DLL via Thread Hijacking
TInjection().Execute(int pid, char *s);Parameters: (process ID, shellcode) - APC Code Injection
APCInjection().Execute(char *s, char *proc_name);Parameters: (shellcode, process name)
- Classic DLL Injection
-
How to use Shellcode Exeuction functions:
- Shellcode Execution (ASM)
ASMShellcodeExecution().Execute();Parameters: (none) | Go toincludes/shellcode/asm.hppto edit in your own custom shellcode! - Classic Shellcode Execution
LocalShellcodeExecution().Execute(char *code);Parameters: (shellcode) - Shellcode Execution via Windows Fibers
FiberShellcodeExecution().Execute(char *s);Parameters: (shellcode) - Shellcode Execution via RemoteThread
RemoteProcessShellcodeExecution().Execute(char *code);Parameters: (shellcode) - Regular Shellcode Execution (No Windows API)
ExecuteShellCodeNoAPI().Execute(char *shellcode);Parameters: (shellcode)
- Shellcode Execution (ASM)
Steps for compiling & running:
compile.bat
g++ -o <binary> <source_file> syringe.dll
https://github.com/0x1CA3