danielkrupinski / Inflame

User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.
MIT License
87 stars 21 forks source link
assembly assembly-language dll dll-injection dll-injector fasm flat-assembler injector winapi windows x86 x86-64

Inflame

User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.

Features

Getting Started

Prerequisites

FASM (flat assembler) for Windows is required to compile Inflame. You can get the latest version here.

Visual Studio is required to compile manual-map module - Inflame.dll / Inflame64.dll. You can omit installing VS by downloading required DLL from Release section.

Clone

Clone this repo to your local machine

git clone https://github.com/danielkrupinski/Inflame.git

Installing

Inflame is available in 2 versions:

  1. Choose correct Inflame version based on dll and process architecture. See above.
  2. Copy chosen .asm file to same directory as FASM.EXE.
  3. Open cmd.exe there and enter following command:
    fasm Inflame.asm

or

fasm Inflame64.asm

  1. If everything went right you should see output similar to this one:

    flat assembler  version 1.73.04  (1048576 kilobytes memory)
    3 passes, 1536 bytes.

    and output executable Inflame.exe or Inflame64.exe should exist.

  2. Then switch to manual-map branch and open Inflame.sln in Visual Studio 2017.

Compile Inflame.dll with x86 | Release or x64 | Release configuration.

Finally, copy Inflame.dll to same directory as Inflame.exe.

Usage

Run Inflame.exe/Inflame64.exe using following syntax:

Inflame / Inflame64 [injection method - see below] [path to dll or dll name when in the same folder] [process name]

Available injection method options:

Valid command should look like these:

Inflame -loadlibrary test.dll Steam.exe

or

Inflame64 -manual-map test64.dll notepad.exe

Acknowledgments

License

Copyright (c) 2018-2019 Daniel Krupiński

This project is licensed under the MIT License - see the LICENSE file for details.