Runnable examples
Tutorial binaries under
examples/in the repo — each one builds a small chain ofmaldevpackages and demonstrates a single technique end-to-end. Cross-link the markdown pages in this section (docs/examples/*.md) with the binary you want to actually compile and run.
The full catalogue with one-line descriptions, technique mapping,
and a "What it demonstrates" column lives in the repo at
examples/README.md.
Naming convention
<domain>-<technique> to align with docs/techniques/<domain>/<technique>.md.
Operators reading the technique page in this handbook see a direct
pointer to the runnable companion.
Highlights
privesc-dll-hijack— full chain fromlowusershell toNT AUTHORITY\SYSTEMvia DLL hijack, with packer + AMSI bypass + preset.Aggressive evasion stack. Ships its own README walkthrough.packer-tour— every packer mode (Mode 1 EXE+SGN, Mode 6 shellcode-self-exec, Mode 7 DLL+SGN+LZ4, Mode 8 EXE→DLL convert, Mode 10 proxy DLL).syscall-matrix— same routine run throughwsyscall.MethodWinAPI,MethodNative,MethodDirect,MethodIndirect; useful as a base for measuring per-method telemetry.
Building
GOOS=windows GOARCH=amd64 go build -o /tmp/example.exe ./examples/<name>
Adding a new example
See the "Adding a new example" section in
examples/README.md.