Skip to content

theflakes/Evil_DLL

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Evil_DLL

Simple DLL to test various injection methods.

Will write a file to the directory "c:\pwned" named pwned_{pid}.txt.

  • {pid} = pid of process injected.

File content example:

[*]          Pid: "7204"
[*]      Process: "C:\\Windows\\system32\\regsvr32.exe"
[*]         Args: [".\\evil_dll.dll"]
[*]         User: "user"
[*]       Domain: "DOMAIN"
[*] Created file: "c:\\pwned\\pwned_7204.txt"

To compile all dependencies into the DLL create a ".cargo\config.toml" directory and file at the root of your Rust project with the following content.

[target.x86_64-pc-windows-msvc]
rustflags = ["-Ctarget-feature=+crt-static"]

Disclaimer

This tool comes with no warranty or support. If anyone chooses to use it, you accept all responsability and liability.

About

Simple DLL to test various injection methods.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages