{"id":26901944,"url":"https://github.com/malwarekid/inject-exe","last_synced_at":"2025-04-01T09:08:54.715Z","repository":{"id":246631334,"uuid":"821700757","full_name":"malwarekid/Inject-EXE","owner":"malwarekid","description":"The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single output executable. This output executable will contain both the malicious and legitimate executables.","archived":false,"fork":false,"pushed_at":"2024-06-30T06:26:57.000Z","size":8,"stargazers_count":8,"open_issues_count":0,"forks_count":3,"subscribers_count":1,"default_branch":"main","last_synced_at":"2024-07-01T11:21:31.799Z","etag":null,"topics":["antivirus-bypass","av-bypass","bind-exe","bypass","evasion","exe","exe-packer","inject-exe","malware","malware-bypass","malware-packers","packer-builder","python3"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/malwarekid.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-06-29T07:29:55.000Z","updated_at":"2024-07-01T07:43:36.000Z","dependencies_parsed_at":"2024-06-29T08:41:12.025Z","dependency_job_id":"e79c6a41-a38d-4e42-8ec6-4f3bf352f604","html_url":"https://github.com/malwarekid/Inject-EXE","commit_stats":null,"previous_names":["malwarekid/inject-exe"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/malwarekid%2FInject-EXE","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/malwarekid%2FInject-EXE/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/malwarekid%2FInject-EXE/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/malwarekid%2FInject-EXE/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/malwarekid","download_url":"https://codeload.github.com/malwarekid/Inject-EXE/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246612481,"owners_count":20805355,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["antivirus-bypass","av-bypass","bind-exe","bypass","evasion","exe","exe-packer","inject-exe","malware","malware-bypass","malware-packers","packer-builder","python3"],"created_at":"2025-04-01T09:08:54.165Z","updated_at":"2025-04-01T09:08:54.707Z","avatar_url":"https://github.com/malwarekid.png","language":"Python","funding_links":[],"categories":[],"sub_categories":[],"readme":"# Inject-EXE\n\n## Overview\n\n- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single output executable. This output executable will contain both the malicious and legitimate executables. This tool is designed to work on Windows systems and requires a Windows environment or Wine if you are using linux to build the executable.\n\n## Features\n\n- **Malicious EXE Embedded into Legit EXE:** Combines a malicious executable with a legitimate executable, embedding the malicious content within the legitimate wrapper.\n- **Helps in Malware Development:** Facilitates the creation of combined executables for testing and development purposes in a controlled environment.\n- **Bypass Antivirus Detection:** Conceals the malicious executable within a legitimate one, potentially helping to evade basic antivirus detection mechanisms.\n- **Assists in Social Engineering:** Creates a seemingly legitimate executable that can be used in social engineering attacks to trick users into executing malicious code.\n- **Executable Packaging:** Packages both the malicious and legitimate executables into a single output executable.\n\n## How to Use\n\n![Inject-EXE](https://github.com/malwarekid/Inject-EXE/assets/91931069/baaebb95-c22e-4642-8611-8ef0bce736af)\n\n\n1. **Clone the Repository:**\n\n    `git clone https://github.com/malwarekid/Inject-EXE.git \u0026\u0026 cd Inject-EXE`\n\n2. **Run the Script:**\n\n    `python3.exe Inject-EXE.py`\n\n```\npython3.exe Inject-EXE.py\n\n    ____        _           __        _______  __ ______\n   /  _/___    (_)__  _____/ /_      / ____/ |/ // ____/\n   / // __ \\  / / _ \\/ ___/ __/_____/ __/  |   // __/\n _/ // / / / / /  __/ /__/ /_/_____/ /___ /   |/ /___\n/___/_/ /_/_/ /\\___/\\___/\\__/     /_____//_/|_/_____/\n         /___/\n                                      By @malwarekid\n\nEnter your malicious executable: payload.exe\nEnter your legit executable: calc.exe\nInject-EXE generated and save as: calc-output.exe\n```\n\n3. **Enter Input Parameters:**\n\n   - **Malicious Executable:** Enter the path to your malicious executable.\n   - **Legitimate Executable:** Enter the path to your legitimate executable.\n\n4. **Output Executable:** The combined output executable will be saved in the current directory with the name based on the legitimate executable's name appended with `-output`.\n\n## Requirements\n\n- Python 3.x\n- PyInstaller\n\n## Installation\n\nEnsure you have the required dependencies:\n\n`python3.exe -m pip install pyinstaller`\n\n## Example\n\n`python3.exe Inject-EXE.py`\n\n\nWhen prompted, enter the paths to your malicious and legitimate executables:\n\n```\nEnter your malicious executable: path/to/malicious.exe\nEnter your legit executable: path/to/legit.exe\n```\nThe script will generate a combined executable in the current directory.\n\n\n## Contributors\n\n- [MalwareKid](https://github.com/malwarekid)\n\n## License\n\nThis project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.\n\n---\n\n## Notes\n\nFeel free to contribute, report issues, or provide feedback. Don't forget to follow me on [Instagram](https://www.instagram.com/malwarekid/) and [GitHub](https://github.com/malwarekid/). Happy Hacking!\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmalwarekid%2Finject-exe","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmalwarekid%2Finject-exe","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmalwarekid%2Finject-exe/lists"}