Crates.io | Amputate |
lib.rs | Amputate |
version | 0.1.0 |
source | src |
created_at | 2022-08-15 18:57:20.314547 |
updated_at | 2022-08-15 18:57:20.314547 |
description | crate for (currently windows) process injections using different techniques |
homepage | |
repository | |
max_upload_size | |
id | 646101 |
size | 4,434 |
A place for popular offensive tradecraft techniques
usage :
fn code_inject("explorer",[0x00,0x0a.......].to_vec()); // injects raw shellcode into the given process
fn loadl_dll("explorer","C:\temp\shell.dll") // injects the dll into the given process
hold on while I update more techniques that not only include shellcode and injection techniques but also detours,manualmappings,apicall cloaks and ....