• Stars
    star
    748
  • Rank 60,661 (Top 2 %)
  • Language
    C#
  • License
    GNU General Publi...
  • Created over 5 years ago
  • Updated about 3 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Process Injection
  *   )           )         *   )                        )  
` )  /(   (    ( /(   (   ` )  /(         (           ( /(  
 ( )(_))  )\   )\())  )\   ( )(_))   (    )(     (    )\()) 
(_(_())  ((_) ((_)\  ((_) (_(_())    )\  (()\    )\  ((_)\  
|_   _|   (_) | |(_)  (_) |_   _|   ((_)  ((_)  ((_) | |(_) 
  | |     | | | / /   | |   | |    / _ \ | '_| / _|  | ' \  
  |_|     |_| |_\_\   |_|   |_|    \___/ |_|   \__|  |_||_| 

TikiTorch was named in homage to CACTUSTORCH by Vincent Yiu. The basic concept of CACTUSTORCH is that it spawns a new process, allocates a region of memory, writes shellcode into that region, and then uses CreateRemoteThread to execute said shellcode. Both the process and shellcode are specified by the user. The primary use case is as a JavaScript/VBScript loader via DotNetToJScript, which can be utilised in a variety of payload types such as HTA and VBA.

TikiTorch takes this a step further by offering more advanced processs spawning and injection:

The TikiTorch solution has 2 projects:

  1. TikiLoader
  2. TikiSpawn

The TikiLoader is the core DLL that handles all of the actual spawning and injection logic. TikiSpawn is a demo console app showing how to consume the TikiLoader.

Basic Usage

using System.Diagnostics;
using TikiLoader;

var hollower = new Hollower
{
    BinaryPath = @"C:\Windows\System32\notepad.exe",
    WorkingDirectory = @"C:\Windows\System32",
    ParentId = Process.GetProcessesByName("explorer")[0].Id,
    BlockDlls = true
};
            
hollower.Hollow(Shellcode, true);

More Repositories

1

Sherlock

PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.
PowerShell
1,831
star
2

Watson

Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities
C#
1,491
star
3

SharpC2

Command and Control Framework written in C#
C#
338
star
4

MiscTools

Miscellaneous Tools
C#
259
star
5

AmsiScanBufferBypass

Bypass AMSI by patching AmsiScanBuffer
C#
235
star
6

Aggressor-Script

Collection of Aggressor Scripts for Cobalt Strike
PowerShell
172
star
7

CsWhispers

Source generator to add D/Invoke and indirect syscall methods to a C# project.
C#
147
star
8

EWSToolkit

Abusing Exchange via EWS
C#
146
star
9

DInvoke

Dynamically invoke arbitrary unmanaged code from managed code without P/Invoke.
C#
130
star
10

RuralBishop

D/Invoke port of UrbanBishop
C#
102
star
11

PPEnum

Simple BOF to read the protection level of a process
C
95
star
12

SCMUACBypass

C++
88
star
13

SpawnWith

C++
84
star
14

ExternalC2.NET

.NET implementation of Cobalt Strike's External C2 Spec
C#
81
star
15

Fork-n-Run

C#
69
star
16

CollectorService

C#
50
star
17

Rosplant

C#
50
star
18

AsyncNamedPipes

Send and receive messages over Named Pipes asynchronously.
C#
39
star
19

AsyncSockets

Example of async client/server sockets in .NET 5
C#
16
star
20

Mjolnir

Shell
14
star
21

offensive-defence

HTML
13
star
22

McAfeeForOutlook

Beef hook OWA / Outlook
JavaScript
11
star
23

EncryptedKeyExchange

C#
11
star
24

p0wnedLoader

XSLT
9
star
25

SignalRDemo

C#
8
star
26

KerbTestApp

C#
7
star
27

SharpC2-Docs

Python
4
star
28

PacketAlchemy

Playing with packets in C#
C#
3
star
29

rastamouse.me

HTML
3
star
30

Invoke-XMRig

PowerShell
1
star