https://github.com/byt3n33dl3/gxc-bloodhuntr
Veins and Blood hunting knife collections for Active Directory Execution process.
Science Score: 13.0%
This score indicates how likely this project is to be science-related based on various indicators:
-
○CITATION.cff file
-
✓codemeta.json file
Found codemeta.json file -
○.zenodo.json file
-
○DOI references
-
○Academic publication links
-
○Committers with academic emails
-
○Institutional organization owner
-
○JOSS paper metadata
-
○Scientific vocabulary similarity
Low similarity (7.4%) to scientific vocabulary
Keywords
active-directory
bloodhound
cybersecurity
dll-injection
hash
offensive
Last synced: 5 months ago
·
JSON representation
Repository
Veins and Blood hunting knife collections for Active Directory Execution process.
Basic Info
Statistics
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
- Releases: 1
Topics
active-directory
bloodhound
cybersecurity
dll-injection
hash
offensive
Created 11 months ago
· Last pushed 11 months ago
Metadata Files
Readme
Funding
License
README.md
BloodHuntr
Veins and Blood hunting knife for Active Directory Execution process.
Projects of
- BlockingDLL: This toolset is for testing blocking DLL process. See README.md.
- CloneProcess ./CloneProcess :nThis directory is for process forking and reflection. See README.md.
- CommandLineSpoofing ./CommandLineSpoofing : This PoC performs Command Line Spoofing. This technique may not work for Windows 11.
- DarkLoadLibrary ./DarkLoadLibrary : PoCs in this directory are for testing Dark Load Library. See README.md
- GhostlyHollowing ./GhostlyHollowing : This PoC performs Ghostly Hollowing.
- Misc ./Misc : This directory is for helper tools to development PoCs in this repository.
- PhantomDllHollower ./PhantomDllHollower : This PoC performs Phantom DLL Hollowing. See README.md.
- PPIDSpoofing ./PPIDSpoofing : This PoC performs PPID Spoofing.
- ProcessDoppelgaenging ./ProcessDoppelgaenging : This PoC performs Process Doppelgänging. Due to kernel protection improvement for Microsoft Defender, this technique does not work for recent Windows OS (since about 2021, maybe). So if you want to test this technique in newer environment, must be stop
MicrosofttheWindows Defender Antivirus Service. See the issue - ProcessGhosting ./ProcessGhosting : This PoC performs Process Ghosting. Due to kernel protection, this technique does not work for newer Windows from 22H2.
- ProcessHerpaderping : This PoC performs Process Herpaderping. Due to file lock issue, if you choose a fake image file smaller than you want to execute, file size shrinking will be failed and corrupt file signature for herpaderping process. To take full advantage of this technique, fake image file size should be larger than you want to execute. Due to kernel protection, this technique does not work for newer Windows from 22H2.
- ProcessHollowing : This PoC performs Process Hollowing. Unlike the original, the PE image is parsed into a new memory area instead of using
ZwUnmapViewOfSectionorNtUnmapViewOfSection. - ProcMemScan : This is a diagnostic tool to investigate remote process. See README.md.
- ProtectedProcess : This toolset is for testing Protected Process. See README.md.
- ReflectiveDLLInjection : This toolset is for testing Reflective DLL Injection. See README.md.
- sRDI : This directory is for tool to sRDI (Shellcode Reflective DLL Injection). See README.md.
- TransactedHollowing : This PoC performs Transacted Hollowing.
- WmiSpawn : This PoC tries to spawn process with WMI. The processes will be spawn as child processes of
WmiPrvSE.exe. Supports local machine process execution and remote machine process execution. The usage can see README.md.
Reference
Blocking DLL
- Preventing 3rd Party DLLs from Injecting into your Malware
- Staying Under the Radar - Part 1 - PPID Spoofing and Blocking DLLs
- PPID Spoofing & BlockDLLs with NtCreateUserProcess
Command Line Spoofing
- Hide Artifacts: Process Argument Spoofing
- The return of the spoof part 2: Command line spoofing
- Process Ghosting
- What you need to know about Process Ghosting, a new executable image tampering attack
Process Herpaderping
- Process Herpaderping
- Process Herpaderping (Mitre:T1055)
Process Hollowing - Process Injection: Process Hollowing - Process Hollowing and Portable Executable Relocations
Ghostly Hollowing and Transacted Hollowing
- GitHub - hasherezade on transacted_hollowing
Protected Process
- Unknown Known DLLs
- Unreal Mode : Breaking Protected Processes
- The Evolution of Protected Processes Part 1: Pass-the-Hash Mitigations in Windows 8.1
Acknowledgments
Thanks for your research:
- Sulaiman Aziz @byt3n33dl3
- Tal Liberman @tal_liberman
- Eugene Kogan @EuKogan
- hasherezade @hasherezade
- Gabriel Landau @GabrielLandau
- Forrest Orr @_forrestorr
- Stephen Fewer @stephenfewer
- batsec @_batsec_
- Nick Landers @monoxgas
Owner
- Name: Sulaiman
- Login: byt3n33dl3
- Kind: user
- Location: Error 403: Not on earth
- Website: https://byt3n33dl3.substack.com/
- Twitter: byt3n33dl3
- Repositories: 91
- Profile: https://github.com/byt3n33dl3
I N F R A X 8 6
GitHub Events
Total
- Watch event: 1
- Public event: 1
Last Year
- Watch event: 1
- Public event: 1
Issues and Pull Requests
Last synced: 8 months ago
All Time
- Total issues: 0
- Total pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Total issue authors: 0
- Total pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0
Past Year
- Issues: 0
- Pull requests: 0
- Average time to close issues: N/A
- Average time to close pull requests: N/A
- Issue authors: 0
- Pull request authors: 0
- Average comments per issue: 0
- Average comments per pull request: 0
- Merged pull requests: 0
- Bot issues: 0
- Bot pull requests: 0
Top Authors
Issue Authors
Pull Request Authors
Top Labels
Issue Labels
Pull Request Labels
Dependencies
BlockingDLL/BlockingDLLProcessSpawn/BlockingDLLProcessSpawn.csproj
nuget
BlockingDLL/DLLInjector/DLLInjector.csproj
nuget
BlockingDLL/RemoteCodeInjector/RemoteCodeInjector.csproj
nuget
BlockingDLL/SelfDefend/SelfDefend.csproj
nuget
CloneProcess/RemoteForking/RemoteForking.csproj
nuget
CloneProcess/SnapshotDump/SnapshotDump.csproj
nuget
CommandLineSpoofing/CommandLineSpoofing/CommandLineSpoofing.csproj
nuget
DarkLoadLibrary/DarkLibraryLoader/DarkLibraryLoader.csproj
nuget
GhostlyHollowing/GhostlyHollowing/GhostlyHollowing.csproj
nuget
Misc/CalcRor13Hash/CalcRor13Hash/CalcRor13Hash.csproj
nuget
Misc/EaDumper/EaDumper/EaDumper.csproj
nuget
Misc/HandleScanner/HandleScanner/HandleScanner.csproj
nuget
Misc/HashResolveTester/HashResolveTester/HashResolveTester.csproj
nuget
Misc/PeRipper/PeRipper/PeRipper.csproj
nuget
Misc/ProcAccessCheck/ProcAccessCheck/ProcAccessCheck.csproj
nuget
PPIDSpoofing/PPIDSpoofing/PPIDSpoofing.csproj
nuget
PhantomDllHollower/PhantomDllHollower/PhantomDllHollower.csproj
nuget
ProcMemScan/ProcMemScan/ProcMemScan.csproj
nuget
ProcessDoppelgaenging/ProcessDoppelgaenging/ProcessDoppelgaenging.csproj
nuget
ProcessGhosting/ProcessGhosting/ProcessGhosting.csproj
nuget
ProcessHerpaderping/ProcessHerpaderping/ProcessHerpaderping.csproj
nuget
ProcessHollowing/ProcessHollowing/ProcessHollowing.csproj
nuget
ProtectedProcess/SdDumper/SdDumper/SdDumper.csproj
nuget
ReflectiveDLLInjection/ReflectiveInjector/ReflectiveInjector.csproj
nuget
TransactedHollowing/TransactedHollowing/TransactedHollowing.csproj
nuget
WmiSpawn/WmiSpawn/WmiSpawn.csproj
nuget
sRDI/ShellcodeReflectiveInjector/ShellcodeReflectiveInjector.csproj
nuget