Skip to content

Instantly share code, notes, and snippets.

{
"description": "Enterprise techniques used by APT33, ATT&CK group G0064 v1.2",
"name": "APT33 (G0064)",
"domain": "mitre-enterprise",
"version": "2.2",
"techniques": [
{
"score": 1,
"techniqueID": "T1110",
"comment": "APT33 has used password spraying to gain access to target systems.[4]"
@stevecoward
stevecoward / Inject.cs
Created August 20, 2020 19:21
APC Queue Code Injection Code
using System;
using System.Runtime.InteropServices;
public class TestClass
{
[DllImport("Kernel32", SetLastError = true, CharSet = CharSet.Unicode)]
public static extern IntPtr OpenProcess(uint dwDesiredAccess, bool bInheritHandle, uint dwProcessId);
[DllImport("Kernel32", SetLastError = true, CharSet = CharSet.Unicode)]
public static extern IntPtr VirtualAllocEx(IntPtr hProcess, IntPtr lpAddress, uint dwSize, uint flAllocationType, uint flProtect);

Keybase proof

I hereby claim:

  • I am stevecoward on github.
  • I am scoward1 (https://keybase.io/scoward1) on keybase.
  • I have a public key ASBJwhOyaxbJpQEvYxlwik8O-J7UJlENu3m910IdxScdiwo

To claim this, I am signing this object: