Skip to content

azerg/Remote_DLL_Injector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Remote Stealth DLL Injector

C++ DLL Injector. Might bypass smth ( old codes from 2012 :D ).

todo:

  • injected dll might use c++ exceptions.
  • fill caves between injected dll's sections with random bytes
  • x64 support lol

Usage

Sample code ships with dummy InjectorUI.

UI:

  • Process name - executable name ( e.g. targetApp.exe )

Options:

  • remove PE-header - cleans PE-header after injection to preserve memory-scan detection
  • random head\random tail - adds extra random bytes to the beginning\end of injected module
  • remove extra sections - clears ".rsrc" & ".relocs" sections after injection
  • inject with local dll - Appending our dll-to-inject codes to a dummy (100% clean) dll. After injection, stub will execute our dll. Dummy dll is used to bypass analysis of injected executable if exists.