Pentester's Promiscuous Notebook
search
Ctrlk
TwitterGitHubBlog
  • README
  • ⚒️Pentest
    • C2chevron-right
    • Infrastructurechevron-right
    • OSINTchevron-right
    • Password Brute Forcechevron-right
    • Perimeterchevron-right
    • Shellschevron-right
    • Webchevron-right
    • Wi-Fichevron-right
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Developmentchevron-right
      • API Hashing
      • API Hooking
      • BOF / COFF
      • CFG
      • Code Injectionchevron-right
        • DLL Injectors
        • Process Hollowing
      • DLL Hijacking
      • Golang
      • Kernel Mode
      • PIC / Shellcode
      • Nim
      • Sandbox Evasion
      • Syscalls
      • Windows API
  • 🐞Exploit Dev
    • BOFchevron-right
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linuxchevron-right
    • Networkingchevron-right
    • Virtualizationchevron-right
    • Windows
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ⚔️Red Teamchevron-right
  2. Developmentchevron-right
  3. Code Injection

DLL Injectors

Inject DLLs into remote process's virtual address space

hashtag
Reflective DLL Injection (RDI)

  • https://github.com/stephenfewer/ReflectiveDLLInjectionarrow-up-right

  • https://github.com/dismantl/ImprovedReflectiveDLLInjectionarrow-up-right

  • https://github.com/Moriarty2016/NimRDIarrow-up-right

  • https://bruteratel.com/research/feature-update/2021/06/01/PE-Reflection-Long-Live-The-King/arrow-up-right

  • https://github.com/Krypteria/AtlasLdrarrow-up-right

  • https://oldboy21.github.io/posts/2023/12/all-i-want-for-christmas-is-reflective-dll-injection/arrow-up-right

  • https://oldboy21.github.io/posts/2024/02/reflective-dll-got-indirect-syscall-skills/arrow-up-right

  • https://blog.malicious.group/writing-your-own-rdi-srdi-loader-using-c-and-asm/arrow-up-right

  • https://github.com/BlackHat-Ashura/Reflective_DLL_Injectionarrow-up-right

hashtag
Custom LoadLibrary

  • https://www.riskinsight-wavestone.com/en/2024/10/loadlibrary-madness-dynamically-load-winhttp-dll/arrow-up-right

  • https://github.com/OtterHacker/Conferences/tree/main/Defcon32arrow-up-right

  • https://injectexp.dev/b/LoadLibraryReloadedarrow-up-right

  • https://github.com/EvanMcBroom/perfect-loaderarrow-up-right

  • https://github.com/paskalian/WID_LoadLibraryarrow-up-right

Last updated 3 months ago

  • Reflective DLL Injection (RDI)
  • Custom LoadLibrary