Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
BSD 3-Clause "New" or "Revised" License
3.61k
stars
637
forks
source link
update loader_exe_*, fix some minor compiler issues #96
A while ago I reported that injecting .NET executables did not work.
I finally found the time and motivation to research this and discovered that if you injected a .NET exe using the loader.exe with an instance of the target binary, it worked perfectly.
Yet if you actually injected loader.bin with inject.exe it didn't (as previously reported)
It turned out that the shellcode at all the loader_exe_* files were outdated and that is why it worked with the loader but not in shellcode form.
I also included some very minor changes:
when you run make debug -f Makefile.mingw, the injector now is also built (useful for catching this type of issues in the future).
I could not run make debug -f Makefile.mingw in my linux machine because loader/peb.h failed, this is now fixed.
Hello!
This PR fixes https://github.com/TheWover/donut/issues/73.
A while ago I reported that injecting .NET executables did not work. I finally found the time and motivation to research this and discovered that if you injected a .NET exe using the
loader.exe
with an instance of the target binary, it worked perfectly. Yet if you actually injectedloader.bin
withinject.exe
it didn't (as previously reported)It turned out that the shellcode at all the
loader_exe_*
files were outdated and that is why it worked with the loader but not in shellcode form.I also included some very minor changes:
make debug -f Makefile.mingw
, the injector now is also built (useful for catching this type of issues in the future).make debug -f Makefile.mingw
in my linux machine becauseloader/peb.h
failed, this is now fixed.