|
|
2 жил өмнө | |
|---|---|---|
| .. | ||
| README.md | 2 жил өмнө | |
| beacon.h | 2 жил өмнө | |
| bofcompile.bat | 2 жил өмнө | |
| injectpoolparty.c | 2 жил өмнө | |
| injectpoolparty.cna | 2 жил өмнө | |
| injectpoolparty.h | 2 жил өмнө | |
| injectpoolparty.o | 2 жил өмнө | |
Inject listener shellcode in a specified process and execute it via Windows Thread Pools. The following execution variants are supported: TP_TIMER (variant 8) | TP_DIRECT (variant 7) | TP_WORK (variant 2).
The following beacon shellcode configuration is injected: x64, process, indirect. This can be changed in the .cna script.
<variant>: Windows Thread Pool execution variant: TP_TIMER | TP_DIRECT | TP_WORK (susceptible to slow execution time).<pid>: Process ID of the target process.<listener>: Beacon listener name.
injectpoolparty <variant> <pid> <listener>injectpoolparty TP_TIMER 1234 Shorthaul-HTTPSx64 Native Tools Command Prompt for VS <2019/2022> terminal.bofcompile.bat script to compile the object file.A round of virtual applause to SafeBreach-Labs! This tool is heavily based on the foundational insights and innovative approaches demonstrated in their Windows Thread Pools research project.