Evil_DLL icon indicating copy to clipboard operation
Evil_DLL copied to clipboard

Simple DLL to test various injection methods.

Evil_DLL

Simple DLL to test various injection methods.

Will write a file to the directory "c:\pwned" named pwned_{pid}.txt.

  • {pid} = pid of process injected.

File content example:

[*]          Pid: "7204"
[*]      Process: "C:\\Windows\\system32\\regsvr32.exe"
[*]         Args: [".\\evil_dll.dll"]
[*]         User: "user"
[*]       Domain: "DOMAIN"
[*] Created file: "c:\\pwned\\pwned_7204.txt"

To compile all dependencies into the DLL create a ".cargo\config.toml" directory and file at the root of your Rust project with the following content.

[target.x86_64-pc-windows-msvc]
rustflags = ["-Ctarget-feature=+crt-static"]

Disclaimer

This tool comes with no warranty or support. If anyone chooses to use it, you accept all responsability and liability.