From 77b52da44b263df4884be2f35f885d8edccbb6fa Mon Sep 17 00:00:00 2001 From: boris Date: Wed, 19 Dec 2018 00:13:24 +1300 Subject: added new loader project :) merry christmas --- legacy/loader/new 1.txt | 65 +++++++++++++++++++++++++++++++++++-------------- 1 file changed, 47 insertions(+), 18 deletions(-) (limited to 'legacy/loader') diff --git a/legacy/loader/new 1.txt b/legacy/loader/new 1.txt index 2770ec9..7225056 100644 --- a/legacy/loader/new 1.txt +++ b/legacy/loader/new 1.txt @@ -1,21 +1,50 @@ -login { - is_valid_login( ) - is_valid_username( ) +SecurityWrapper { + Start( ) // Dispatch security thread to periodically check for blacklisted processes. + Patch( ) // Bytepatch often abused functions to call ExitProcess directly. + Check( ) // Check if dummy functions have been bytepatched (OpenProcess, WriteProcessMemory, VirtualQuery) } -inject { - c_remote_file { - // we can also replace this with the epic - // cheat header thing (have loader scan) - wipe_pe_header - } - - c_remote_load { - c_remote_load( c_file &in ) - inject( ) - } - - c_remote_code { - make_shellcode - } +RemoteCodeParameters { + m_dwEndScene + m_dwEndSceneOrig + //m_dwImportCode + m_dwEntryPoint + m_dwCheatHeader + m_dwVirtualProtect +} + +RemoteCodeServer { + Start( RemoteCodeParameters *Parameters ) + GetBytes( ) +} + +RemoteProcess { + Start( const char *ProcessName ) + GetProcess( ) + Write( ) + Read( ) + Allocate( ) +} + +RemoteCodeClient { + Start( ByteArray &RemoteCode ) + Dispatch( ) +} + +FileReader { + Start( const char *FileName ) + GetBytes( ) +} + +RemoteInjectionServer { + Start( ByteArray &DllData ) + ProcessRelocation( uint32_t RemoteAddress ) + ProcessHeader( RemoteHeader *Header ) + GetBytes( ) +} + +RemoteInjectionClient { + Start( RemoteProcess &Process ) + AllocateMap( uint32_t SizeOfImage ) + WriteToMap( ByteArray &Data ) } \ No newline at end of file -- cgit v1.2.3