https://github.com/wolf49406/shelljectorlocal
Manual map shellcode (aka byte array) injector
https://github.com/wolf49406/shelljectorlocal
injection injector shellcode shellcode-injection shellcode-injector
Last synced: 7 months ago
JSON representation
Manual map shellcode (aka byte array) injector
- Host: GitHub
- URL: https://github.com/wolf49406/shelljectorlocal
- Owner: Wolf49406
- License: gpl-3.0
- Created: 2024-02-06T10:42:04.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-02-08T05:04:20.000Z (over 1 year ago)
- Last Synced: 2024-10-16T07:41:38.788Z (8 months ago)
- Topics: injection, injector, shellcode, shellcode-injection, shellcode-injector
- Language: C++
- Homepage:
- Size: 34.2 KB
- Stars: 5
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ShellJectorLocal
Same as [ShellJector](https://github.com/Wolf49406/ShellJector) but works with local DLL[](https://github.com/Wolf49406/ShellJectorLocal/actions/workflows/msbuild.yml)
## How to Build:
- Open `ShellJectorLocal.sln -> main.cpp`;
- Set `ProcName` and `DllName`;
- Build;## Usage:
- Go to \ShellJectorLocal\Build;
- OR just download the [Latest Release](https://github.com/Wolf49406/ShellJectorLocal/releases/latest);
- Set launch arguments (down below);
- Open Target Process;
- Open `ShellJectorLocal.exe`;## Arguments:
You can set `ProcName` and `DDllName` with `-proc` and `-dll` arguments
(ex: `ShellJectorLocal.exe -proc explorer.exe -dll Payload.dll`)
Arguments are case **sensitive**!## Notice:
ShellJectorLocal.exe will look for Payload.dll near itself!