Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/kimjongbing/dll_injector_uwp
Simple DLL injector coded in Rust and C++, compatible with UWP processes
https://github.com/kimjongbing/dll_injector_uwp
dll dll-hijacking dll-hooking dll-injection dll-injector dll-injector-rust injector microsoft-store microsoft-store-services uwp uwp-applications uwp-apps
Last synced: 5 days ago
JSON representation
Simple DLL injector coded in Rust and C++, compatible with UWP processes
- Host: GitHub
- URL: https://github.com/kimjongbing/dll_injector_uwp
- Owner: kimjongbing
- License: gpl-3.0
- Created: 2023-07-21T15:19:27.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-07-22T07:51:51.000Z (over 1 year ago)
- Last Synced: 2024-12-03T05:18:40.228Z (2 months ago)
- Topics: dll, dll-hijacking, dll-hooking, dll-injection, dll-injector, dll-injector-rust, injector, microsoft-store, microsoft-store-services, uwp, uwp-applications, uwp-apps
- Language: C++
- Homepage:
- Size: 62.5 KB
- Stars: 7
- Watchers: 1
- Forks: 1
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# dll_injector_uwp
This was originally a normal [dll injector](https://github.com/kimjongbing/dll_injector) using the Windows API but it was not working on Microsoft Store applications (UWP) so I made this injector. This works on both UWP applications and normal applications.## Caution
Please make sure your DLL is on a hard drive with an NTFS file system. You will not be able to see the ``Security`` tab otherwise. Look at the [DLL Setup Permissions](#dll-setup-permissions) section to see how to set up the security permissions of your DLL.## Release
You can get the pre-compiled "Release" [here](https://github.com/kimjongbing/dll_injector_uwp/releases)## Usage
1. **List all processes**: Run the following command to list all process IDs (PIDs).```bash
dll_injector.exe list
```
This will return a list of all PIDs currently running on your system.2. **Get PID of a running executable**: If you know the name of an executable and it's currently running, you can get its PID by running:
```bash
dll_injector.exe pid
```
Replace `` with the name of the running executable. This will return the PID of the specified executable.Example:
```bash
dll_injector.exe pid notepad.exe
```3. **Inject a DLL into a process**: To inject a DLL into a process, you need the PID of the target process and the path to the DLL you want to inject. Use the following command:
```bash
dll_injector.exe inject
```
Replace `` with the PID of the target process and `` with the path to the DLL you want to inject.Example:
```bash
dll_injector.exe inject 1234 C:/path/to/your/payload.dll
```## Compile Guide
1. **Clone the repository**: Run the following command in the terminal to download the source code to your local machine.
```bash
git clone https://github.com/kimjongbing/dll_injector_uwp
```2. **Navigate to the project folder**: Change the current directory to the project's root folder by running:
```bash
cd dll_injector_uwp-main
```3. **Compile the project**: Build the project in release mode by running the following command in the root directory of the project.
```bash
cargo build --release
```4. **Navigate to the build output**: Change directory to where the built executable is located by running:
```bash
cd ./target/release
```5. **Run the executable**: Start the application by running `dll_injector.exe`. Upon execution, the console will display usage instructions. You can then provide the necessary arguments based on what you want to do.
This is a command-line application, so all inputs (arguments) should be passed in the command line. Run the command-line as administrator if you have any issues.
## DLL Setup Permissions
**For now you have to do this manually until I set this to be done automatically**
1. Right-click the ``.dll`` file you want to inject.
2. Click the ``Security`` tab.
3. Click ``Edit`` next to ``To change permissions, click Edit:``
4. Click ``Add`` and type ``All`` in the box called ``Enter the objects names to select (examples):``
5. Click OK
6. Make sure it has ``Read & execute`` and ``Read`` enabledYou can read more [here](https://www.unknowncheats.me/forum/general-programming-and-reversing/177183-basic-intermediate-techniques-uwp-app-modding.html)