CARVIEW |
Select Language
HTTP/2 200
date: Mon, 28 Jul 2025 03:21:22 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With,Accept-Encoding, Accept, X-Requested-With
etag: W/"05482584b7eef49a2bea3f201140ad13"
cache-control: max-age=0, private, must-revalidate
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: no-referrer-when-downgrade
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=buRJ4hx%2FU0LLJ4p4ufhl2BjEkQllyPkkkGH02GtLuhpOGJvL74enXGgde421q0O55zp3b7iRY8b4OAqRbjokI4PwVpUAaxNV8OwZ4tKEKM5c%2Bdmjx%2BIwo7lsgYfAddZuZhe7exIjnHjIeILxvqZO%2Fd27Jo5E994KsChHxyoDJiJ90VKm5idKCOZo7BT0x0VmNmnyYkiBWmguoKz6cJIWxRR0H%2FophpF4n%2BugDlM722VRpFoNBZ5%2Bhj0ZGGO6esDgDrCBnVzooWluuAWQyYKpCQ%3D%3D--Cba33ECScHl%2FEW%2Be--rd9xAnw5t7lKrYA4AvAqIg%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.386323462.1753672882; Path=/; Domain=github.com; Expires=Tue, 28 Jul 2026 03:21:22 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Tue, 28 Jul 2026 03:21:22 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: C7A2:1C79A4:1316967:195A56B:6886ECB2
GitHub - OpenSecurityResearch/dllinjector: dll injection tool that implements various methods
Skip to content
Navigation Menu
{{ message }}
-
Notifications
You must be signed in to change notification settings - Fork 113
OpenSecurityResearch/dllinjector
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
DLLInjector v0.2 brad.antoniewicz@foundstone.com -------------------------------------------------- This tool aims to implement various DLL injection techniques that work across multiple Windows versions. The user defines a DLL, a process ID, and technique and the tool attempts to inject the DLL into the process and execute it. This was built using Microsoft Visual Studio 2010 It currently supports the following methods: 1. CreateRemoteThread() 2. NtCreateThreadEx() The following sites were used as a reference when implementing this method: https://securityxploded.com/ntcreatethreadex.php https://noobys-journey.blogspot.com/2010/11/injecting-shellcode-into-xpvista7.html 3. Suspend/Inject/Resume The following sites were used as a reference when implementing this method: https://syprog.blogspot.com/2012/05/createremotethread-bypass-windows.html https://www.kdsbest.com/?p=159 4. RtlCreateUserThread() The following sites were used as a reference when implementing this method: https://syprog.blogspot.com/2012/05/createremotethread-bypass-windows.html?showComment=1338375764336#c4138436235159645886 https://undocumented.ntinternals.net/UserMode/Undocumented%20Functions/Executable%20Images/RtlCreateUserThread.html Todo: 1. Implement SetWindowsHookEx() Method https://www.kdsbest.com/?p=179 2. Implement QueueUserAPC() Method https://webcache.googleusercontent.com/search?q=cache:G8i5oxOWbDMJ:www.hackforums.net/archive/index.php/thread-2442150.html+&cd=3&hl=en&ct=clnk&gl=us&client=firefox-a 3. Implement PrivEscalation as per: https://github.com/rapid7/metasploit-framework/tree/master/external/source/meterpreter/source/extensions/priv/server/elevate The original inspiration for this tool was from VMInjector: https://github.com/batistam/VMInjector Lots of great info here: https://github.com/stephenfewer/ReflectiveDLLInjection
About
dll injection tool that implements various methods
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
You can’t perform that action at this time.