Pentester's Promiscuous Notebook
Ctrlk
TwitterGitHubBlog
  • README
  • ⚒️Pentest
    • C2
    • Infrastructure
    • OSINT
    • Password Brute Force
    • Perimeter
    • Shells
    • Web
    • Wi-Fi
  • ⚔️Red Team
    • Basics
    • Infrastructure
    • Development
      • API Hashing
      • API Hooking
      • BOF / COFF
      • CFG
      • Code Injection
        • DLL Injectors
        • Process Hollowing
      • DLL Hijacking
      • Golang
      • Kernel Mode
      • PIC / Shellcode
      • Nim
      • Sandbox Evasion
      • Syscalls
      • Windows API
  • 🐞Exploit Dev
    • BOF
    • RE
    • WinDbg
  • ⚙️Admin
    • Git
    • Linux
    • Networking
    • Virtualization
    • Windows
Powered by GitBook
On this page
  • Reflective DLL Injection (RDI)
  • Custom LoadLibrary
  1. ⚔️Red Team
  2. Development
  3. Code Injection

DLL Injectors

Inject DLLs into remote process's virtual address space

Reflective DLL Injection (RDI)

  • https://github.com/stephenfewer/ReflectiveDLLInjection

  • https://github.com/dismantl/ImprovedReflectiveDLLInjection

  • https://github.com/Moriarty2016/NimRDI

  • https://bruteratel.com/research/feature-update/2021/06/01/PE-Reflection-Long-Live-The-King/

  • https://github.com/Krypteria/AtlasLdr

  • https://oldboy21.github.io/posts/2023/12/all-i-want-for-christmas-is-reflective-dll-injection/

  • https://oldboy21.github.io/posts/2024/02/reflective-dll-got-indirect-syscall-skills/

  • https://blog.malicious.group/writing-your-own-rdi-srdi-loader-using-c-and-asm/

  • https://github.com/BlackHat-Ashura/Reflective_DLL_Injection

Custom LoadLibrary

  • https://www.riskinsight-wavestone.com/en/2024/10/loadlibrary-madness-dynamically-load-winhttp-dll/

  • https://github.com/OtterHacker/Conferences/tree/main/Defcon32

  • https://injectexp.dev/b/LoadLibraryReloaded

  • https://github.com/EvanMcBroom/perfect-loader

  • https://github.com/paskalian/WID_LoadLibrary

Last updated 2 months ago