Inject DLLs into remote process's virtual address space
https://github.com/stephenfewer/ReflectiveDLLInjectionarrow-up-right
https://github.com/dismantl/ImprovedReflectiveDLLInjectionarrow-up-right
https://github.com/Moriarty2016/NimRDIarrow-up-right
https://bruteratel.com/research/feature-update/2021/06/01/PE-Reflection-Long-Live-The-King/arrow-up-right
https://github.com/Krypteria/AtlasLdrarrow-up-right
https://oldboy21.github.io/posts/2023/12/all-i-want-for-christmas-is-reflective-dll-injection/arrow-up-right
https://oldboy21.github.io/posts/2024/02/reflective-dll-got-indirect-syscall-skills/arrow-up-right
https://blog.malicious.group/writing-your-own-rdi-srdi-loader-using-c-and-asm/arrow-up-right
https://github.com/BlackHat-Ashura/Reflective_DLL_Injectionarrow-up-right
https://www.riskinsight-wavestone.com/en/2024/10/loadlibrary-madness-dynamically-load-winhttp-dll/arrow-up-right
https://github.com/OtterHacker/Conferences/tree/main/Defcon32arrow-up-right
https://injectexp.dev/b/LoadLibraryReloadedarrow-up-right
https://github.com/EvanMcBroom/perfect-loaderarrow-up-right
https://github.com/paskalian/WID_LoadLibraryarrow-up-right
Last updated 5 months ago