2.0.321
This commit is contained in:
vxunderground 2022-10-30 11:06:36 -05:00
parent c63bbcccbb
commit eb95919308
8 changed files with 35 additions and 8 deletions

View File

@ -3,7 +3,7 @@ managed by [vx-underground](https://vx-underground.org) | follow us on [Twitter]
# VX-API
Version: 2.0.313
Version: 2.0.321
Developer: smelly__vx
@ -22,6 +22,8 @@ You're free to use this in any manner you please. You do not need to use this en
| ------------- | --------------- | ------- |
| ByteArrayToCharArray | smelly__vx | String Conversion |
| CharArrayToByteArray | smelly__vx | String Conversion |
| ShlwapiCharStringToWCharString | smelly__vx | String Conversion |
| ShlwapiWCharStringToCharString | smelly__vx | String Conversion |
| CharStringToWCharString | smelly__vx | String Conversion |
| WCharStringToCharString | smelly__vx | String Conversion |
| RtlInitEmptyUnicodeString | ReactOS | Windows Unicode Structure |
@ -153,12 +155,12 @@ You're free to use this in any manner you please. You do not need to use this en
| Function Name | Note | Fixed |
| ------------- | ---- | ----- |
| StringToken | Needs revision, buggy | N/A |
| UnusedSubroutineGetShellViewForDesktop | TryDllMultiMethod | N/A |
| DelayedExecutionExecuteOnDisplayOff | TryDllMultiMethod | N/A |
| GetPidFromWindowsTerminalService | TryDllMultiMethod | N/A |
| NtQueryOpenSubKeysEx | admin required | N/A |
| MpfComMonitorChromeSessionOnce | Usability improvements needed | N/A |
| ~~GetCurrentUserSid~~ | ~~TryDllMultiMethod~~ |October 29th, 2022 |
| ~~DelayedExecutionExecuteOnDisplayOff~~ | ~~TryDllMultiMethod~~ | October 30th, 2022 |
| ~~GetPidFromWindowsTerminalService~~ | ~~TryDllMultiMethod~~ | October 30th, 2022 |
| ~~UnusedSubroutineGetShellViewForDesktop~~ | ~~TryDllMultiMethod~~ | October 30th, 2022 |
| ~~GetCurrentUserSid~~ | ~~TryDllMultiMethod~~ | October 29th, 2022 |
| ~~GetProcessBinaryNameFromHwndW~~ | ~~make A variant~~ | October 29th, 2022 |
| ~~CreateProcessFromIShellDispatchInvoke~~ | ~~TryDllMultiMethod~~ | October 29th, 2022 |
| ~~ShellcodeExecViaCertFindChainInStore~~ | ~~Buggy, unstable~~ | October 23rd, 2022 |

View File

@ -17,6 +17,7 @@ TODO:
int main(VOID)
{
DWORD dwError = ERROR_SUCCESS;
CHAR Buffer[MAX_PATH * sizeof(WCHAR)] = { 0 };
//EXAMPLE PAYLOAD FOR TESTING!
//msfvenom -p windows/x64/exec EXITFUNC=thread CMD=calc.exe -f c -a x64
//Length = 277
@ -47,8 +48,9 @@ int main(VOID)
Sei.dwLengthOfPayloadInBytes = 277;
Sei.MethodEnum = E_ENUMPWRSCHEMES;
ShellcodeExecutionViaFunctionCallbackMain(&Sei);
//MpfComMonitorChromeSessionOnce();
//ShellcodeExecutionViaFunctionCallbackMain(&Sei);
ShlwapiWCharStringToCharString((PWCHAR)L"Test", Buffer, MAX_PATH * sizeof(WCHAR));
return dwError;

View File

@ -0,0 +1,6 @@
#include "Win32Helper.h"
INT ShlwapiCharStringToWCharString(_In_ PCHAR InString, _Inout_ PWCHAR OutString, _In_ INT BufferSize)
{
return SHAnsiToUnicode(InString, OutString, BufferSize);
}

View File

@ -0,0 +1,6 @@
#include "Win32Helper.h"
INT ShlwapiWCharStringToCharString(_In_ PWCHAR InString, _Inout_ PCHAR OutString, _In_ INT BufferSize)
{
return SHUnicodeToAnsi(InString, OutString, BufferSize);
}

View File

@ -32,4 +32,6 @@ VOID RtlInitEmptyUnicodeString(_Inout_ PUNICODE_STRING UnicodeString);
SIZE_T CharStringToWCharString(_Inout_ PWCHAR Destination, _In_ PCHAR Source, _In_ SIZE_T MaximumAllowed);
SIZE_T WCharStringToCharString(_Inout_ PCHAR Destination, _In_ PWCHAR Source, _In_ SIZE_T MaximumAllowed);
VOID ByteArrayToCharArrayA(_Inout_ PCHAR Destination, _In_ PBYTE Source, _In_ DWORD Length);
VOID ByteArrayToCharArrayW(_Inout_ PWCHAR Destination, _In_ PBYTE Source, _In_ DWORD Length);
VOID ByteArrayToCharArrayW(_Inout_ PWCHAR Destination, _In_ PBYTE Source, _In_ DWORD Length);
INT ShlwapiCharStringToWCharString(_In_ PCHAR InString, _Inout_ PWCHAR OutString, _In_ INT BufferSize);
INT ShlwapiWCharStringToCharString(_In_ PWCHAR InString, _Inout_ PCHAR OutString, _In_ INT BufferSize);

View File

@ -226,6 +226,8 @@
<ClCompile Include="SetLastNtStatusInTeb.cpp" />
<ClCompile Include="SetProcessPrivilegeToken.cpp" />
<ClCompile Include="ShellcodeExecutionViaFunctionCallbackMain.cpp" />
<ClCompile Include="ShlwapiCharStringToWCharString.cpp" />
<ClCompile Include="ShlwapiWCharStringToCharString.cpp" />
<ClCompile Include="StringCompare.cpp" />
<ClCompile Include="StringConcat.cpp" />
<ClCompile Include="StringCopy.cpp" />

View File

@ -396,6 +396,12 @@
<ClCompile Include="GetProcessBinaryNameFromHwnd.cpp">
<Filter>Source Files\Windows API Helper Functions\Helper Functions</Filter>
</ClCompile>
<ClCompile Include="ShlwapiCharStringToWCharString.cpp">
<Filter>Source Files\String Manipulation\String Conversion</Filter>
</ClCompile>
<ClCompile Include="ShlwapiWCharStringToCharString.cpp">
<Filter>Source Files\String Manipulation\String Conversion</Filter>
</ClCompile>
</ItemGroup>
<ItemGroup>
<ClInclude Include="Internal.h">

View File

@ -268,6 +268,7 @@ BOOL RemoveDllFromPebW(_In_ LPCWSTR lpModuleName);
/*******************************************
ANTI-DEBUGGING
*******************************************/