SamuelTulach / RwxMeme

State of the art DLL injector that took 20 minutes to make

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool


RwxMeme
Injector abusing RWX regions

About

This injector abuses the fact that some signed (read whitelisted by anticheat) DLLs have RWX (read, write, execute) sections. Since those sections are writable, running simple integrity checks towards them does not make sense, so we can simply map our own DLL into those sections.

In order for this to work on protected processes, another meme is used (EPROCESS->PreviousMode overwritten with vulnerable driver).

Usage

Compile or download the project. Pass the process name, window title and DLL path as process arguments (run without them to get more details). Don't forget that the signed DLL will be visible in the process.

About

State of the art DLL injector that took 20 minutes to make

License:MIT License


Languages

Language:C++ 98.2%Language:C 1.2%Language:CMake 0.6%