Skip to content

theflakes/Evil_DLL

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Evil_DLL

Simple DLL to test various injection methods.

Will write a file to the directory "c:\pwned" named pwned_{pid}.txt.

  • {pid} = pid of process injected.

File content example:

[*]          Pid: "7204"
[*]      Process: "C:\\Windows\\system32\\regsvr32.exe"
[*]         Args: [".\\evil_dll.dll"]
[*]         User: "user"
[*]       Domain: "DOMAIN"
[*] Created file: "c:\\pwned\\pwned_7204.txt"

To compile all dependencies into the DLL create a ".cargo\config.toml" directory and file at the root of your Rust project with the following content.

[target.x86_64-pc-windows-msvc]
rustflags = ["-Ctarget-feature=+crt-static"]

Disclaimer

This tool comes with no warranty or support. If anyone chooses to use it, you accept all responsability and liability.

About

Simple DLL to test various injection methods.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy