项目作者: lewisclark

项目描述 :
A Windows library & executable that injects dynamic-link libraries into processes
高级语言: Rust
项目地址: git://github.com/lewisclark/jector.git
创建时间: 2020-06-08T09:30:05Z
项目社区:https://github.com/lewisclark/jector

开源协议:

下载


Jector

Jector is a work-in-progress Windows tool that injects library files (.dll) into processes. This has numerous uses, such as overriding existing code or adding new features to an application.

Usage

Executable

  1. USAGE:
  2. jector.exe [OPTIONS] --file <dll_file_path> <--pid <pid>|--window <window_name>>
  3. FLAGS:
  4. -h, --help Prints help information
  5. -V, --version Prints version information
  6. OPTIONS:
  7. -f, --file <dll_file_path> The DLL file to inject
  8. -m, --method <loadlibrary/manualmap> The injection method to use [default: loadlibrary]
  9. -p, --pid <pid> The PID of the process to inject into
  10. -w, --window <window_name> The name of the window to inject into

Library

Jector can also be used as a library for usage in other projects.

How It Works

Jector allocates a buffer inside the target process and loads the chosen dynamic-link library into the buffer as the Windows PE Loader does. The advantage of this method over using LoadLibrary or other library invocation routines is the added flexibility and customizability.