Skip to content

Instantly share code, notes, and snippets.

View wizardy0ga's full-sized avatar
😄

WizardYoga wizardy0ga

😄
View GitHub Profile
@wizardy0ga
wizardy0ga / dll_block_apc_inject.c
Last active July 15, 2024 20:12
Spawns a process with mitigations enabled to prevent non microsoft dlls from being loaded into the process. Executes shellcode via APC injection in process.
/*
Author:
wizardy0ga
Date:
July 2024
Arch:
x64
Tested on:
Windows 10 19045.4529
Compiler:
@wizardy0ga
wizardy0ga / hellshall.c
Last active July 15, 2024 20:15
Classic remote process injection using syscalls via hells hall & tartarus gate. Encrypted shellcode is decrypted by encrypted self-bruteforcing encryption key & injected into explorer using the classic remote process injection method.
#include "hellshall.h"
VOID Xor(PBYTE pData, SIZE_T SizeOfData, PBYTE pKey, SIZE_T SizeOfKey) {
for (int i = 0, j = 0; i < SizeOfData; i++, j++) {
if (j >= SizeOfKey) {
j = 0;
}
pData[i] = pData[i] ^ pKey[j];
}
}
@wizardy0ga
wizardy0ga / hellshall.c
Created July 8, 2024 04:21
Local shellcode execution using a combination of hells hall (Indirect syscalls) and tartarus gate (SSN retrieval) techniques.
#include "hellshall.h"
unsigned int CRC32(char* string) {
int i,
crc;
unsigned int byte, c;
const unsigned int g0 = SEED,
g1 = g0 >> 1,
g2 = g0 >> 2,
g3 = g0 >> 3,
@wizardy0ga
wizardy0ga / main.c
Last active July 6, 2024 16:26
Local mapping inject using TartarusGate
/*
Author:
wizardy0ga
Date:
July 2024
Arch:
x64
Tested on:
Windows 10 19045.4529
Compiler:
@wizardy0ga
wizardy0ga / main.c
Last active July 6, 2024 15:59
Bypassing userland hooks with TartarusGate
/*
Author:
wizardy0ga
Date:
July 2024
Arch:
x64
Tested on:
Windows 10 19045.4529
Compiler:
@wizardy0ga
wizardy0ga / UnhookFromWebserver.c
Last active June 30, 2024 05:59
Unhooking ntdll using a copy sourced from the microsoft internet symbol server
/*
Author:
wizardy0ga
Date:
June 2024
Arch:
x64
Tested on:
Windows 10 19045.4529
Compiler:
@wizardy0ga
wizardy0ga / main.c
Last active June 23, 2024 21:16
Unhooking NTDLL using an unhooked text section from a suspended process, syswhispers3 style (indirect syscalls)
/*
Author:
wizardy0ga
Date:
June 2024
Arch:
x64
Tested on:
Windows 10 19045.4529
Compiler:
@wizardy0ga
wizardy0ga / UnhookNtdllFromSuspendedProcess.c
Last active June 23, 2024 16:39
Unhooking ntdll using a copy from a suspended process
/*
Author:
wizardy0ga
Date:
June 2024
Arch:
x64
Compiler:
MSVC
Description:
@wizardy0ga
wizardy0ga / alacritty.toml
Last active June 21, 2024 03:14
A configuration file for alacritty
[font]
size = 12
[font.normal]
family = "Fira Code"
style = "Regular"
[font.bold]
family = "Fira Code"
style = "Bold"
@wizardy0ga
wizardy0ga / picom.conf
Created June 19, 2024 22:47
A configuration file for picom
# Picom Configuration, courtesy of Xubuntu Developers
# https://raw.githubusercontent.com/Xubuntu/xubuntu-default-settings/master/etc/xdg/xdg-xubuntu/picom.conf
#
# About Picom: https://github.com/yshui/picom
# Heavily based on: https://bit.ly/1l5OrzL
# Sample settings: https://github.com/chjj/compton/blob/master/compton.sample.conf
# --- Backend (OpenGL used by default)
# Related Links
# https://github.com/chjj/compton/wiki/perf-guide