{"id":15049285,"url":"https://github.com/danielkrupinski/memject","last_synced_at":"2025-04-06T02:09:15.491Z","repository":{"id":43509146,"uuid":"187460328","full_name":"danielkrupinski/MemJect","owner":"danielkrupinski","description":"Simple Dll injector loading from memory. Supports PE header and entry point erasure. Written in C99.","archived":false,"fork":false,"pushed_at":"2019-12-21T16:14:14.000Z","size":41,"stargazers_count":466,"open_issues_count":14,"forks_count":88,"subscribers_count":19,"default_branch":"master","last_synced_at":"2025-04-06T02:09:02.009Z","etag":null,"topics":["c","c99","dll-injection","hacking","injection","manual-map-dll","memject","reverse-engineering"],"latest_commit_sha":null,"homepage":"","language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/danielkrupinski.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null},"funding":{"custom":"https://paypal.me/DanielK19"}},"created_at":"2019-05-19T10:02:02.000Z","updated_at":"2025-04-03T15:42:00.000Z","dependencies_parsed_at":"2022-09-21T09:14:28.585Z","dependency_job_id":null,"html_url":"https://github.com/danielkrupinski/MemJect","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/danielkrupinski%2FMemJect","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/danielkrupinski%2FMemJect/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/danielkrupinski%2FMemJect/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/danielkrupinski%2FMemJect/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/danielkrupinski","download_url":"https://codeload.github.com/danielkrupinski/MemJect/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247423515,"owners_count":20936626,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["c","c99","dll-injection","hacking","injection","manual-map-dll","memject","reverse-engineering"],"created_at":"2024-09-24T21:19:28.712Z","updated_at":"2025-04-06T02:09:15.464Z","avatar_url":"https://github.com/danielkrupinski.png","language":"C","readme":"# MemJect [![C](https://img.shields.io/badge/language-C-%23f34b7d.svg)](https://en.wikipedia.org/wiki/C) [![Windows](https://img.shields.io/badge/platform-Windows-0078d7.svg)](https://en.wikipedia.org/wiki/Microsoft_Windows) [![x86](https://img.shields.io/badge/arch-x86-red.svg)](https://en.wikipedia.org/wiki/X86) [![License](https://img.shields.io/github/license/danielkrupinski/MemJect.svg)](LICENSE)\nSimple dll injector designed to load dll from memory. Supports PE header and entry point erasure. Written in C99.\n\n## Features\n\n* load dll from byte array in memory, without storing dll file on disk\n* decrypt encrypted dll buffer\n* erase DLLEntryPoint\n* erase PE header\n\n## Getting started\n\n### Prerequisites\nC99 compiler for Windows is required in order to compile MemJect. Microsoft Visual Studio is required to load solution for easy compilation (MemJect.sln).\n\n### Cloning\nThe very first step in order to compile MemJect is to clone this repo from GitHub to your local computer. Git is required to step futher, if not installed download it [here](https://git-scm.com). Open git bash / git cmd / cmd and enter following command:\n```\ngit clone https://github.com/danielkrupinski/MemJect.git\n```\n`MemJect` folder should have been succesfully created, containing all the source files.\n\n### Compiling from source\n\nWhen you have equiped a copy of source code, next step is opening **MemJect.sln** in Microsoft Visual Studio. If you don't have Visual Studio, compile **MemJect.cpp** using your compilator.\n\nFind below line in **MemJect.cpp** and replace **csgo.exe** with your destination process name:\n```c\n#define PROCESS_NAME \"csgo.exe\"\n```\n\nFind below line in **MemJect.cpp** and supply your dll in form of byte array there.\nYou can use [my python script](https://github.com/danielkrupinski/PE2HEX) to convert dll to array of bytes or almost any hex-editor with `export to C` function.\n```c\nstatic const uint8_t binary[] = {\n0x4d, 0x5a, 0x80, 0x00, 0x01, ...\n```\nThen change build configuration to `Release | x86` and simply press **Build solution**.\n\nIf everything went right you should receive `MemJect.exe` binary file.\n\n### Encryption\n","funding_links":["https://paypal.me/DanielK19"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdanielkrupinski%2Fmemject","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdanielkrupinski%2Fmemject","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdanielkrupinski%2Fmemject/lists"}