malware source code
search
⌘Ctrlk
malware source code
  • message-smileIntroduction
  • Code base
    • file-circle-exclamationHeaders
    • pageCRT Recreation
  • pageString Hashing
  • pageAntidebugging Methods
  • pageLibrary Loading
  • pageError Handling
  • pageFingerprinting
  • pageWrappers and Helpers
    • GetProcessHeapFromTeb
    • GetCurrentThread
    • IsPathValid
    • IsDllLoaded
    • GetFileSizeFromPath
    • IsRegistryKeyValid
    • GetCurrentProcess
    • GetCurrentProcessIdFromTeb
    • GetCurrentProcessIdFromOffset
    • ExecuteBinaryShellExecuteEx
    • GetProcessPathFromLoaderLoad
    • GetProcessPathFromUserProcessParameters
    • GetProcessBinaryNameFromHwnd
    • GetCurrentDirectoryFromUserProcessParameters
    • GetSystemWindowsDirectory
    • ImplGetModuleHandle
    • Masquerade Peb as Explorer
  • pageProcess Creation Techniques
  • pageShellcode Execution
  • pageCompression
  • pageNetworking
  • pageLsass Related
  • pageProxied Functions
  • pageEvasion
  • pageComponent Object Model
  • My Projects
    • Proof-of-Concepts
    • Write-ups
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

pageWrappers and Helpers

GetProcessHeapFromTebchevron-rightGetCurrentThreadchevron-rightIsPathValidchevron-rightIsDllLoadedchevron-rightGetFileSizeFromPathchevron-rightIsRegistryKeyValidchevron-rightGetCurrentProcesschevron-rightGetCurrentProcessIdFromTebchevron-rightGetCurrentProcessIdFromOffsetchevron-rightExecuteBinaryShellExecuteExchevron-rightGetProcessPathFromLoaderLoadchevron-rightGetProcessPathFromUserProcessParameterschevron-rightGetProcessBinaryNameFromHwndchevron-rightGetCurrentDirectoryFromUserProcessParameterschevron-rightGetSystemWindowsDirectorychevron-rightImplGetModuleHandlechevron-rightMasquerade Peb as Explorerchevron-right
PreviousIsProcessRunning (simple)chevron-leftNextGetProcessHeapFromTebchevron-right