SkillAgentSearch skills...

MalwareAdventurez

My adventures in learning about different userland malware techniques, such as syscalls, injection, unhooking or sandbox evasion.

Install / Use

/learn @eversinc33/MalwareAdventurez
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Malware Adventurez

Me writing crappy malware and archiving it for future reference.

DISCLAIMER: A lot of this stuff doesnt work, is copied or badly written. This is my archive so I can refer to this when I need code snippets.

|Name|Description|Language| |---|---|---| |Keylogger|Basic Keylogger|C++| |ClipboardStealer|Basic Clipboard Stealer|C++| |Nimject|My stupid first syscall packer|Nim| |Dynamic Resolving Shellcode Runner|Shellcode Runner that resolves functions dynamically, resulting in a PE with an empty IAT|C++| |Process Hollowing XOR|ProcessHollowing injector with XOR encrypted Payload|C#| |Process Hollowing AES|ProcessHollowing injector with AES encrypted Payload|C++| |ProcHollowDinvoke|ProcessHollowing injector using DInvoke|C#| |InvokeAsAdmin|Kindly Ask for Admin Permissions before invoking Shellcode|C#| |APC-Q_Unhooking|Overwrite hooked ntdll with a fresh copy to avoid EDR hooks and invoke Shellcode via APC-Queuing.|C++| |Parallel Syscalls Technique|Read syscall numbers from ntdll for selected syscalls from LdrpThunkSignature and use these syscalls to read a fresh unhooked ntdll from disc.|C++| |PPID Spoofing|Spoof Parent Process ID by using NtCreateUserProcess|C++| |Reflective PE Injection|Reflective PE Injection|C++| |Shellcode String Encoder|Use strings from a binary to encode shellcode in order to reduce entropy|C++| |AmsiPatch|Start a powershell and patch AmsiScanBuffer|C++| |ThreadContextInject|Inject shellcode using SetThreadContext|C++| |MapViewInjection|Inject code in a remote process using a mapped section view|C++| |Hardware Breakpoint Remote Process AMSI Bypass|Hardware Breakpoint AMSI Bypass for Remote Process. Doesnt work|C++| |Reflective DLL Injection|Reimplementing Reflective DLL Injection (WIP)|C++| |SyscallSorting|Syscall Sorting|C++| |RdpCredThief|Hook CredUnPackAuthenticationBufferW to yoink creds from mstsc.exe (or other applications)|C++| |AmsiProviderEnum|Enumerate AMSI providers and the respective DLLs|C#|

Related Skills

View on GitHub
GitHub Stars79
CategoryEducation
Updated24d ago
Forks12

Languages

C++

Security Score

80/100

Audited on Mar 14, 2026

No findings