Skip to content

A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualization techniques. Built to operate both as a standalone PowerShell script and as a compiled executable (.exe) for maximum flexibility and stealth.

License

Notifications You must be signed in to change notification settings

ashc0m-cmd/Fuck-Windows-Security

 
 

Repository files navigation

GuidedHacking DLL Injector Libra

A feature-rich DLL injection library which supports x86, WOW64 and x64 injections. Developed by Broihon for Guided Hacking. It features five injection methods, six shellcode execution methods and various additional options. Session separation can be bypassed with all methods.

If you want to use this library with a GUI check out the GH Injector GUI.

Release Downloads: Download DLL Injector Here

image imageimage


DLL Injection methods

  • LoadLibraryExW
  • LdrLoadDll
  • LdrpLoadDll
  • LdrpLoadDllInternal
  • ManualMapping

Shellcode execution methods

  • NtCreateThreadEx
  • Thread hijacking
  • SetWindowsHookEx
  • QueueUserAPC
  • KernelCallback
  • FakeVEH

DLL Manual mapping features

  • Section mapping
  • Base relocation
  • Imports
  • Delayed imports
  • SEH support
  • TLS initialization
  • Security cookie initalization
  • Loader Lock
  • Shift image
  • Clean datadirectories

Additional features

  • Various cloaking options
    • PEB unlinking
    • PE header cloaking
    • Thread cloaking
  • Handle hijacking
  • Hook scanning/restoring

Official Guided Hacking Courses


Where to download the compiled binaries

This repo doesn't contain the compiled binaries, just the source code for the library. If you want to download the compiled program, you must be a paying customer on our website where you can download it. If you can compile it yourself and get it working, then great, enjoy it, but you do not have permission/license to distribute the compiled binaries or any of our other content from our website.

Getting Started With The GH DLL Injector

You can easily use mapper by including the compiled binaries in your project. Check the provided Injection.h header for more information. Make sure you have the compiled binaries in the working directory of your program. On first run the injection module has to download PDB files for the native (and when run on x64 the wow64) version of the ntdll.dll to resolve symbol addresses. Use the exported StartDownload function to begin the download. The injector can only function if the downloads are finished. The injection module exports GetSymbolState and GetImportState which will return INJ_ERROR_SUCCESS (0) if the PDB download and resolving of all required addresses is completed. Additionally GetDownloadProgress can be used to determine the progress of the download as percentage. If the injection module is to be unloaded during the download process call InterruptDownload or there's a chance that the dll will deadlock your process.

#include "Injection.h"

HINSTANCE hInjectionMod = LoadLibrary(GH_INJ_MOD_NAME);

auto InjectA = (f_InjectA)GetProcAddress(hInjectionMod, "InjectA"); auto GetSymbolState = (f_GetSymbolState)GetProcAddress(hInjectionMod, "GetSymbolState"); auto GetImportState = (f_GetSymbolState)GetProcAddress(hInjectionMod, "GetImportState"); auto StartDownload = (f_StartDownload)GetProcAddress(hInjectionMod, "StartDownload"); auto GetDownloadProgressEx = (f_GetDownloadProgressEx)GetProcAddress(hInjectionMod, "GetDownloadProgressEx");

//due to a minor bug in the current version you have to wait a bit before starting the download //will be fixed in version 4.7 Sleep(500);

StartDownload();

//since GetSymbolState and GetImportState only return after the downloads are finished //checking the download progress is not necessary while (GetDownloadProgressEx(PDB_DOWNLOAD_INDEX_NTDLL, false) != 1.0f) { Sleep(10); }

#ifdef _WIN64 while (GetDownloadProgressEx(PDB_DOWNLOAD_INDEX_NTDLL, true) != 1.0f) { Sleep(10); } #endif

while (GetSymbolState() != 0) { Sleep(10); }

while (GetImportState() != 0) { Sleep(10); }

DWORD TargetProcessId;

INJECTIONDATAA data = { "", TargetProcessId, INJECTION_MODE::IM_LoadLibraryExW, LAUNCH_METHOD::LM_NtCreateThreadEx, NULL, 0, NULL, NULL, true };

strcpy(data.szDllPath, DllPathToInject);

InjectA(&data); A feature-rich DLL injection library which supports x86, WOW64 and x64 injections. Developed by Broihon for Guided Hacking. It features five injection methods, six shellcode execution methods and various additional options. Session separation can be bypassed with all methods.

If you want to use this library with a GUI check out the [GH Injector GUI](https://github.com/guided-hacking(GH-Injector-GUI).

Release Downloads: Download DLL Injector Here

image imageimage


[### DLL Injection method:]

  • LoadLibraryExW
  • LdrLoadDll
  • LdrpLoadDll
  • LdrpLoadDllInternal
  • ManualMapping

[### Shellcode execution methods]

  • NtCreateThreadEx
  • Thread hijacking
  • SetWindowsHookEx
  • QueueUserAPC
  • KernelCallback
  • FakeVEH

[### DLL Manual mapping features:

  • Section mapping
  • Base relocation
  • Imports
  • Delayed imports
  • SEH support
  • TLS initialization
  • Security cookie initalization
  • Loader Lock
  • Shift image
  • Clean datadirectories]

[### Additional features:

  • Various cloaking options
    • PEB unlinking
    • PE header cloaking
    • Thread cloaking
  • Handle hijacking
  • Hook scanning/restoring]

[<>Official Guided Hacking Courses</

Bypass the following sites' paywalls with this extension

Adweek
Algemeen Dagblad
American Banker
ÁmbitoBaltimore Sun
[Barron's]https://www.beacon.com)\ Bloomberg Quint
Bloomberg
BN De Stem
Boston Globe
Brabants Dagblad
Brisbane Times
Business Insider
Caixin
Central Western Daily
Chemical & Engineering News
Chicago Tribune
Corriere Della Sera
Crain's Chicago Business
Daily Press
De Gelderlander
De Groene Amsterdammer
De Stentor
De Speld
De Tijd
De Volkskrant
DeMorgen
Denver Post
Diario Financiero
Domani
Dynamed Plus
Eindhovens Dagblad
El Mercurio
El Pais
El Periodico
Elu24
Encyclopedia Britannica
Estadão
Examiner
Expansión
Financial News
Financial Post
Financial Times
First Things
Foreign Policy
Fortune
Genomeweb
Glassdoor
Globes
Grubstreet
Haaretz.co.il
Haaretz.com
Harper's Magazine
Hartford Courant
Harvard Business Review
Harvard Business Review China
Herald Sun
Het Financieel Dagblad
History Extra
Humo
Il Manifesto
Inc.com
Interest.co.nz
Investors Chronicle https://www.lecho.be)\ L.A. Business Journal
La Nación
La Repubblica
La Stampa
La Tercera
La Voix du Nord
Le Devoir
Le Parisien
Les Échos
Loeb Classical Library
London Review of Books
Los Angeles Times
MIT Sloan Management Review
MIT Technology Review
Medium
Medscape
Mexicon News Daily
Mountain View Voice
National Geographic
New York Daily News
NRC Handelsblad
NT News
National Post
Neue Zürcher Zeitung
New York Magazine
New Zealand Herald
Orange County Register
Orlando Sentinel
PZC
Palo Alto Online
Parool
Postimees
Quartz
Quora
Quotidiani Gelocal
Republic.ru
Reuters
San Diego Union Tribune
San Francisco Chronicle
Scientific American
Seeking Alpha
Slate
SOFREP
Statista
Star Tribune
Stuff
SunSentinel
Tech in Asia
Telegraaf
The Advertiser
The Advocate
The Age
The American Interest
The Athletic
The Athletic (UK)
The Atlantic
The Australian Financial Review
The Australian
The Business Journals
The Canberra Times
The Courier
The Courier Mail
The Cut
The Daily Telegraph
The Diplomat
The Economist
The Globe and Mail
The Herald
The Hindu
The Irish Times
The Japan Times
The Kansas City Star
The Mercury News
The Mercury Tasmania
The Morning Call
The Nation
The National
The New Statesman
The New York Times
The New Yorker
The News-Gazette
The Olive Press
The Philadelphia Inquirer
The Saturday Paper
The Seattle Times
The Spectator Australia
The Spectator
The Sydney Morning Herald
The Telegraph
The Toronto Star
The Wall Street Journal
The Washington Post
The Wrap
TheMarker
Times Literary Supplement
Towards Data Science
Trouw
Tubantia
Vanity Fair
Vrij Nederland
Vulture
Winston-Salem Journal
Wired
Zeit Online

Sites with limited number of free articles

The free article limit can normally be bypassed by removing cookies for the site.*

Install the Cookie Remover extension [for Google Chrome]https://chrome.google.com/webstore/detail/cookie-remover/kcgpggonjhmeaejebeoeomdlohicfhce) or for Mozilla Firefox. Please rate it 5 stars if you find it useful.

When coming across a paywall click the cookie icon to remove the cookies then refresh the page.

*May not always succeed

New site requests

Only large or major sites will be considered. Usually premium articles cannot be bypassed as they are behind a hard paywall.

  1. Install the uBlock Origin extension if it hasnt been installed already. See if you are still getting a paywall.
  2. Check if using Cookie Remover [Google Chrome version]https://chrome.google.com/webstore/detail/cookie-remover/kcgpggonjhmeaejebeoeomdlohicfhce) or Mozilla Firefox version) can bypass the paywall. If not, continue to the next step.
  3. First search [Issues]https://github.com/iamadamdev/bypass-paywalls-chrome/issues) to see if the site has been requested already.
  4. Visit an article on the site you want to bypass the paywall for and copy the article title.
  5. Open up a new incognito window (Ctrl+Shift+N on Chrome) or Private window (Ctrl+Shift+P on Firefox), and paste the article title into Google.
  6. Click on the same article from the Google search results page.
  7. If it loads without a paywall you can [submit a request]https://github.com/iamadamdev/bypass-paywalls-chrome/issues/new/choose) and replace the entire template text with the word "Confirmed". Otherwise please do not submit an issue as this extension cannot bypass it either.

Troubleshooting

RemovePaywall tools

This folder contains small utilities to help build RemovePaywall

  • remove-paywall-search.html — small HTML UI to encode a URL and open RemovePaywall in a new tab.
  • remove-paywall.css — styles for the HTML UI.
  • remove-paywall-generator.js — Node.js CLI: reads URLs (one per line) and prints RemovePaywall links.
  • remove-paywall-bookmarklet.txt — bookmarklet code you can drag to your bookmarks bar.

Usage

Open the HTML UI

  • Double-click tools/remove-paywall/remove-paywall-search.html or open it from your editor's Live Preview.
  • Paste the article URL, click Open in RemovePaywall or Copy Link.

Bookmarklet

  • Drag the link from remove-paywall-bookmarklet.txt to your bookmarks bar or copy the javascript:(...) line into a new bookmark URL.
  • When on an article page, click the bookmark to open RemovePaywall for that page.

Node CLI

PowerShell example (from repo root):

# Run generator with a file containing URLs (one per line)
node .\tools\remove-paywall\remove-paywall-generator.js urls.txt > rpw-links.txt

# Or use the convenience npm script added to the root package.json
pnpm run gen:rpw -- urls.txt > rpw-links.txt

# Using stdin
Get-Content .\urls.txt | node .\tools\remove-paywall\remove-paywall-generator.js

Notes

  • The CLI simply percent-encodes the input URL and appends the #google_vignette fragment; it does not bypass access controls or alter the target site.
  • The bookmarklet opens a new tab using the RemovePaywall search URL for the current page. this is a highly optimised ELEMENT Tool. Automation Machine PRODUCING THE BEST IMFORMATION NEEDED!!! that works smoothly It is the best engineering for elements extensions everything It's made from the best.

#GuidedHacking DLL Injector Library

A feature-rich DLL injection library which supports x86, WOW64 and x64 injections. Developed by Broihon for Guided Hacking. It features five injection methods, six shellcode execution methods and various additional options. Session separation can be bypassed with all methods.

If you want to use this library with a GUI check out the GH Injector GUI.

Release Downloads: Download DLL Injector Here

image imageimage

[### Contributing - Pull Requests]

PRs are welcome.

  1. If making a PR to add a new site, confirm your changes actually bypass the paywall.
  2. At a minimum these files need to be updated: README.md, manifest-ff.json, src/js/sites.js, and possibly src/js/background.js, and/or src/js/contentScript.js.
  3. Follow existing code-style and use camelCase.
  4. Use JavaScript Semi-Standard Style linter. Don't need to follow it exactly. There will be some errors (e.g., do not use it on sites.js).

[### Show your support]

  • I do not ask for donations, all I ask is that you star this repo.

Disclaimer

  • This software is provided for educational purposes only and is provided "AS IS", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. in no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software.

Troubleshooting Issues with the .NET Install Tool

Install Script Timeouts

[Please note that, depending on your network speed, installing the .NET Core runtime might take some time. By default, the installation terminates unsuccessfully if it takes longer than 10 minutes to finish. If you believe this is too little (or too much) time to allow for the download, you can change the timeout value by setting dotnetAcquisitionExtension.installTimeoutValue to a custom value.]

[Learn more about configuring Visual Studio Code settings [here]https://code.visualstudio.com/docs/getstarted/settings and see below for an example of a custom timeout in a settings.json file. In this example the custom timeout value is 180 seconds, or 3 minutes.]

{
  "dotnetAcquisitionExtension.installTimeoutValue": 180
}

Windows 7 Failures

The .NET Install Tool requires TLS 1.2 to be enabled in order to install .NET. For more information on TLS1.2, see [the documentation]https://docs.microsoft.com/mem/configmgr/core/plan-design/security/enable-tls-1-2-client).

Manually Installing .NET

If .NET installation is failing or you want to reuse an existing installation of .NET, you can use the dotnetAcquisitionExtension.existingDotnetPath setting. .NET can be manually installed from [the .NET website]https://aka.ms/dotnet-core-download). To direct this extension to that installation, update your settings with the extension ID and the path as illustrated below.

Windows

//```json "dotnetAcquisitionExtension.existingDotnetPath": [ {"extensionId": "msazurermtools.azurerm-vscode-tools", "path": "C:\Program Files\dotnet\dotnet.exe"} ]


#### Mac

```json
    "dotnetAcquisitionExtension.existingDotnetPath": [
        {"extensionId": "msazurermtools.azurerm-vscode-tools", "path": "/usr/local/share/dotnet/dotnet"}
    ]

Other Issues

Haven't found a solution? Check out our open issues. If you don't see your issue there, please file a new issue by evoking the .NET Install Tool: Report an issue with the .NET Install Tool command from Visual Studio Code.

[##Extension Directory Structure

Bypass AV/EDR Profile - Content Breakdown

1. Dropper

  • Dunger
  • Donut (memory-based loader)
  • SysWOW64 techniques
  • Inspect tool (H)
  • Process injection methods
  • Various evasion techniques for initial payload delivery

2. Manual Obfuscation

  • Webpage obfuscation
    • Edit source code obfuscation
    • String encoding for payloads
    • JavaScript obfuscation
    • Various encoding methods
  • Code obfuscation tools
    • Multiple encoding schemes
    • Custom packers
    • String manipulation

3. Process Injection

  • Various injection techniques
  • CreateRemoteThread
  • Process hollowing/doppelganging
  • Shellcode injection methods
  • Thread hijacking
  • Tool repositories

4. Automatic Obfuscation

  • Invoke-Obfuscation (PowerShell)
  • Automated string obfuscation
  • AMSI bypass techniques
  • Runtime obfuscation
  • Command-line obfuscation tools

5. Detect Virtual Machine

  • VM detection techniques
  • Sandbox evasion
  • Environment checks
  • Hardware fingerprinting
  • Timing-based detection
  • Registry/file-based checks

6. From Alive Beacon

  • C2 communication methods
  • Beacon manipulation
  • Traffic obfuscation
  • Command and control techniques
  • Encrypted communications

7. Credits

  • Security researchers
  • Tool developers
  • Various security resources and references

8. Extension

This is a Chrome/Firefox extension that bypasses paywalls on news and media sites, with theme customization and per-site control.]

[- manifest.json] [- README.md] [- build.sh] [- content_script.js] [- background.js] [- config.json] [- preview.json] [- package.json] [- popup.html] [- popup.js] [- popup.css] [- Final.sh] [- /icons] [- icon16.png]


## Visual Studio Code devcontainer Command Line Interface

## Deprecation

This CLI is deprecated. Please update to the replacement at https://www.npmjs.com/package/@devcontainers/cli.

## Description

This package provides a stand-alone command line interface (CLI) for working with dev containers. This CLI allows you to build and run dev containers independently of Visual Studio Code, ideal for re-using dev containers in your build pipelines. See the [Dev Containers CLI documentation](https://code.visualstudio.com/docs/remote/devcontainer-cli) for more details on the `devcontainer` CLI.

## License

This package is distibuted under a traditional [Microsoft product license](https://aka.ms/dev-container-cli-license)

About

A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualization techniques. Built to operate both as a standalone PowerShell script and as a compiled executable (.exe) for maximum flexibility and stealth.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • PowerShell 100.0%