Git Product home page Git Product logo

inflame's Introduction

Inflame

User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.

Features

  • minimal size: weighing 1536B and 2560B, 32-bit and 64-bit version respectively, Inflame is a tiny little injector
  • lightning fast: injection takes less than 1ms
  • easy to use: invoked with Command Line options
  • universal: both 32-bit and 64-bit versions are actively maintained
  • safe: Inflame is safe to use and it won't harm your PC. If you don't believe - check the source code.

Getting Started

Prerequisites

FASM (flat assembler) for Windows is required to compile Inflame. You can get the latest version here.

Visual Studio is required to compile manual-map module - Inflame.dll / Inflame64.dll. You can omit installing VS by downloading required DLL from Release section.

Clone

Clone this repo to your local machine

git clone https://github.com/danielkrupinski/Inflame.git

Installing

Inflame is available in 2 versions:

  • 32-bit - Inflame.asm - for both 32-bit dll and target process
  • 64-bit - Inflame64.asm - for both 64-bit dll and target process
  1. Choose correct Inflame version based on dll and process architecture. See above.
  2. Copy chosen .asm file to same directory as FASM.EXE.
  3. Open cmd.exe there and enter following command:
fasm Inflame.asm

or

fasm Inflame64.asm

  1. If everything went right you should see output similar to this one:
flat assembler  version 1.73.04  (1048576 kilobytes memory)
3 passes, 1536 bytes.

and output executable Inflame.exe or Inflame64.exe should exist.

  1. Then switch to manual-map branch and open Inflame.sln in Visual Studio 2017.

Compile Inflame.dll with x86 | Release or x64 | Release configuration.

Finally, copy Inflame.dll to same directory as Inflame.exe.

Usage

Run Inflame.exe/Inflame64.exe using following syntax:

Inflame / Inflame64 [injection method - see below] [path to dll or dll name when in the same folder] [process ID]

Available injection method options:

  • -loadlibrary - LoadLibraryA method
  • -manual-map - manual map method with thread hijacking

Valid command should look like these:

Inflame -loadlibrary test.dll 1024

or

Inflame64 -manual-map test64.dll 2048

Acknowledgments

License

Copyright (c) 2018 Daniel Krupiński

This project is licensed under the MIT License - see the LICENSE file for details.

inflame's People

Contributors

danielkrupinski avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.