Skip to content

Commit 1a63701

Browse files
authored
Update README.md
1 parent 2f74133 commit 1a63701

File tree

1 file changed

+0
-2
lines changed

1 file changed

+0
-2
lines changed

README.md

-2
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,6 @@ Helpful examples have also been done by [hasherzade](https://github.com/hasherez
3535

3636
1. [Zer0Mem0ry's example](https://github.com/Zer0Mem0ry/RunPE/blob/master/RunPE.cpp) differs from mine in that the process hollowing program injects ITSELF with the malicious memory. In this example also, the malicious program is never stored on or read off the disk. Instead, its [shellcode](https://github.com/hasherezade/pe_to_shellcode) is stored in the code of the RunPE program before compilation. This has the benefit of avoiding signature detection of the malicious file. Combined with obfuscation and/or packing, the malicious data may never see itself on the disk in a readable format and offers potentially better antivirus evasion. If having everything in the same file but still injecting ANOTHER process is important to you, feel free to combine these methods and replace the components of mine that read the data from the malicious file on disk into memory, with theirs.
3737

38-
2. With the hope of proving beneficial to others as well, I started this project primarily to benefit my learning of malware evasion techniques. If anything is wrong, please let me know!
39-
4038
## Sources:
4139

4240
- https://medium.com/@jain.sm/process-hollowing-930b30452279.

0 commit comments

Comments
 (0)