tishion / mmLoader

A library for loading dll module bypassing windows PE loader from memory (x86/x64)
http://tishion.github.io/mmLoader/
MIT License
534 stars 167 forks source link

Where do we define the target process? #6

Closed mtardal closed 7 years ago

mtardal commented 7 years ago

First of all, thanks for this amazing project,

I wanna use your shellcode manualmap injection project, I just couldnt find the place to define the target process in which we want to inject our dll. Any tips would be appreciated.

Thanks again.

tishion commented 7 years ago

@mtardal Sorry for late reply, there is no email notification for the issue opening.

I didn't understand what's your purpose. This project providing shell code means to protect the mmLoader functionality. For example you don't want to put the code of mmLoader into your final exe or dll, then you can use shell code and load it as data dynamically.

Did you mean to acquire for a injector?