The program is designed to perform process injection. Currently the tool supports 4 process injection techniques.
1) Vanilla Process Injection
2) DLL Injection
3) Process Hollowing
4) APC Queue
5) Dynamic Invoke - Vanilla Process Injection
The tool accepts shellcode in 4 formats.
1) base64
2) hex
3) c
4) raw
Supports 3 detection evading techniques.
1) Parent PID Spoofing
Encryption
2) XOR Encryption (It can also be used with Parent PID Spoofing technique but can't be used with DLL Injection Technique)
3) AES Encryption (It can also be used with Parent PID Spoofing technique but can't be used with DLL Injection Technique)
Usage Description
----- -----------
/t Specify the process injection technique id.
1 = Vanilla Process Injection
2 = DLL Injection
3 = Process Hollowing
4 = APC Queue Injection
/f Specify the format of the shellcode
base64
hex
c
raw
/pid Specify the process id
/parentproc Specify the parent process name
/path Specify the path of the file that contains the shellcode
/ppath Specify the path of the executable that will be spawned (Mandatory while using /parentproc argument)
/url Specify the url where the shellcode is hosted
/enc Specify the encryption type (aes or xor) in which the shellcode is encrypted
/key Specify the key that will be used to decrypt the shellcode.
/help Show help
https://3xpl01tc0d3r.blogspot.com/2019/08/process-injection-part-i.html
https://3xpl01tc0d3r.blogspot.com/2019/09/process-injection-part-ii.html
https://3xpl01tc0d3r.blogspot.com/2019/10/process-injection-part-iii.html
https://medium.com/@r3n_hat/parent-pid-spoofing-b0b17317168e
https://3xpl01tc0d3r.blogspot.com/2019/12/process-injection-part-v.html
https://3xpl01tc0d3r.blogspot.com/2020/08/process-injection-tool-updates.html
Credits also goes to :
Aaron Bray & Rasta Mouse for Process Hollowing code
The Wover & b33f for Dynamic Invoke - (https://thewover.github.io/Dynamic-Invoke/)