Skip to content

Ilesnat/Process_Injection_WINAPI

Repository files navigation

README: Process Injection Tool

Overview

This CPP File is designed to perform process injection. Process injection involves injecting code into the virtual address space of another process, allowing the injected code to run within the context of that process. This is a basic example I created at home to inject shellcode into the Notepad process. It's a simple approach to process injection, intended as a learning exercise. The shellcode used in this example spawns the Calculator app.

Usage

  1. Preparation:

    • Open the sln file in Visual Studio and build the project.
    • Ensure that the target process (the process you want to inject into) is running.
    • Obtain the PID of the target process (I use Notepad)
    get-process -Name "notepad" | Select-Object Id
  2. Running the Executable:

    • Open a command prompt.
    • Navigate to the directory where Process_Injection_WINAPI.exe is located after it has been built.
  3. Basic Command Syntax:

    ProcessInjection.exe <PID>

    Parameters:

    • <PID>: The Process ID of the target process.
  4. Monitoring and Logging:

    • I installed Sysmon to monitor the associated Event IDs. I noticed a Sysmon Event ID 1, which highlighted the process injection.

⚠️ Disclaimer: This project is for educational purposes only. It is designed to help individuals understand how malware operates so they can better defend against it.

About

high-level process injection examples

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages