Skip to content

Instantly share code, notes, and snippets.

@quangnh89
quangnh89 / inject.c
Created July 2, 2018 03:33 — forked from hfiref0x/inject.c
Process Doppelgänging
//
// Ref = src
// https://www.blackhat.com/docs/eu-17/materials/eu-17-Liberman-Lost-In-Transaction-Process-Doppelganging.pdf
//
// Credits:
// Vyacheslav Rusakov @swwwolf
// Tom Bonner @thomas_bonner
//
#include <Windows.h>
@quangnh89
quangnh89 / Suspect_File_1_writeup.py
Created August 7, 2017 17:49
SHA2017 CTF Rev100 Suspect File 1 write-up
#!/usr/bin/env python
import angr
def malloc_cb(state):
print "malloc!"
state.regs.eax = 0xc0000000 # concrete address
def strlen_cb(state):
@quangnh89
quangnh89 / deobfuscate.py
Last active October 12, 2023 17:26
A malware analysis case-study: Deobfuscate Windows malicious obfuscated code
# Slide : https://docs.google.com/presentation/d/1jLUDucNtvGotHw0LOvDonMYwCkXYcb-cnsOWLNt-Ag0
import sys
import pefile
from capstone import *
from capstone.x86 import *
from keystone import *
from datetime import datetime
MAX_DISASM_COUNT = 1000 * 1000
FILE_NAME = r"dump-g4pic.dll"