All Projects → danielkrupinski → Inflame

danielkrupinski / Inflame

Licence: MIT license
User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.

Programming Languages

assembly
5116 projects

Projects that are alternatives of or similar to Inflame

SocketHook
Socket hook is an injector based on EasyHook (win only) which redirect the traffic to your local server.
Stars: ✭ 38 (-39.68%)
Mutual labels:  winapi, injector, dll-injection, dll-injector
Reloaded.Assembler
Minimal .NET wrapper around the simple, easy to use Flat Assembler written by Tomasz Grysztar. Supports both x64 and x86 development.
Stars: ✭ 17 (-73.02%)
Mutual labels:  x86-64, x86, fasm
fasm
flat assembler 1 - reconstructed source history
Stars: ✭ 187 (+196.83%)
Mutual labels:  x86-64, x86, fasm
dll injector
A simple commandline injector using classic DLL injection
Stars: ✭ 81 (+28.57%)
Mutual labels:  injector, dll-injection, dll-injector
DLL-INJECTOR
I created a dll injector I am going to Open source its Code. But remember one thing that is any one can use it only for Educational purpose .I again say do not use it to damage anyone's Computer.But one thing if you are using it for some good purpose like to help someone who really need help then I permit you to use it.
Stars: ✭ 14 (-77.78%)
Mutual labels:  dll, injector, dll-injection
singlefile
featured cs:go internal hack, one file and less than 1000 lines.
Stars: ✭ 47 (-25.4%)
Mutual labels:  dll, injector, dll-injection
DLL-Injector
Inject and detour DLLs and program functions both managed and unmanaged in other programs, written (almost) purely in C#. [Not maintained].
Stars: ✭ 29 (-53.97%)
Mutual labels:  dll, injector, dll-injection
oberon-07-compiler
Oberon-07 compiler for x64 (Windows, Linux), x86 (Windows, Linux, KolibriOS), MSP430x{1,2}xx, STM32 Cortex-M3
Stars: ✭ 45 (-28.57%)
Mutual labels:  x86-64, x86
asm2cfg
Python command-line tool and GDB extension to view and save x86, ARM and objdump assembly files as control-flow graph (CFG) pdf files
Stars: ✭ 42 (-33.33%)
Mutual labels:  x86-64, x86
SDA
SDA is a rich cross-platform tool for reverse engineering that focused firstly on analysis of computer games. I'm trying to create a mix of the Ghidra, Cheat Engine and x64dbg. My tool will combine static and dynamic analysis of programs. Now SDA is being developed.
Stars: ✭ 98 (+55.56%)
Mutual labels:  x86-64, x86
Capstone.NET
.NET Core and .NET Framework binding for the Capstone Disassembly Framework
Stars: ✭ 108 (+71.43%)
Mutual labels:  x86-64, x86
Mctrl
C library providing set of additional user interface controls for Windows, intended to be complementary to standard Win32API controls from USER32.DLL and COMCTL32.DLL.
Stars: ✭ 169 (+168.25%)
Mutual labels:  dll, winapi
Osiris
Free open-source game cheat for Counter-Strike: Global Offensive, written in modern C++. GUI powered by Dear ImGui.
Stars: ✭ 1,851 (+2838.1%)
Mutual labels:  dll, dll-injection
bmod
bmod parses binaries for modification/patching and disassembles machine code sections.
Stars: ✭ 12 (-80.95%)
Mutual labels:  x86-64, x86
Vac Hooks
Hook WinAPI functions used by Valve Anti-Cheat. Log calls and intercept arguments & return values. DLL written in C.
Stars: ✭ 103 (+63.49%)
Mutual labels:  dll, winapi
profiler-api
The portable version of JetBrains profiler API for .NET Framework / .NET Core / .NET / .NET Standard / Mono
Stars: ✭ 21 (-66.67%)
Mutual labels:  x86-64, x86
cozinha loader
An injector focused on undetectability that automatically injects a DLL into the target process with VAC3 bypass.
Stars: ✭ 53 (-15.87%)
Mutual labels:  dll, dll-injection
kasm
Assembler library for Kotlin
Stars: ✭ 40 (-36.51%)
Mutual labels:  x86-64, x86
UniversalUnityHooks
A framework designed to hook into and modify methods in unity games via dlls
Stars: ✭ 78 (+23.81%)
Mutual labels:  dll, injector
Assembly-Syntax-Definition
This is the greatest syntax definition of All Time
Stars: ✭ 23 (-63.49%)
Mutual labels:  x86-64, x86

Inflame

User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.

Features

  • minimal size: weighing 1536B and 2560B, 32-bit and 64-bit version respectively, Inflame is a tiny little injector
  • lightning fast: injection takes less than 1ms
  • easy to use: invoked with Command Line options
  • universal: both 32-bit and 64-bit versions are actively maintained
  • safe: Inflame is safe to use and it won't harm your PC. If you don't believe - check the source code.

Getting Started

Prerequisites

FASM (flat assembler) for Windows is required to compile Inflame. You can get the latest version here.

Visual Studio is required to compile manual-map module - Inflame.dll / Inflame64.dll. You can omit installing VS by downloading required DLL from Release section.

Clone

Clone this repo to your local machine

git clone https://github.com/danielkrupinski/Inflame.git

Installing

Inflame is available in 2 versions:

  • 32-bit - Inflame.asm - for both 32-bit dll and target process
  • 64-bit - Inflame64.asm - for both 64-bit dll and target process
  1. Choose correct Inflame version based on dll and process architecture. See above.
  2. Copy chosen .asm file to same directory as FASM.EXE.
  3. Open cmd.exe there and enter following command:
fasm Inflame.asm

or

fasm Inflame64.asm

  1. If everything went right you should see output similar to this one:
flat assembler  version 1.73.04  (1048576 kilobytes memory)
3 passes, 1536 bytes.

and output executable Inflame.exe or Inflame64.exe should exist.

  1. Then switch to manual-map branch and open Inflame.sln in Visual Studio 2017.

Compile Inflame.dll with x86 | Release or x64 | Release configuration.

Finally, copy Inflame.dll to same directory as Inflame.exe.

Usage

Run Inflame.exe/Inflame64.exe using following syntax:

Inflame / Inflame64 [injection method - see below] [path to dll or dll name when in the same folder] [process name]

Available injection method options:

  • -loadlibrary - LoadLibraryA method
  • -manual-map - manual map method with thread hijacking

Valid command should look like these:

Inflame -loadlibrary test.dll Steam.exe

or

Inflame64 -manual-map test64.dll notepad.exe

Acknowledgments

License

Copyright (c) 2018-2019 Daniel Krupiński

This project is licensed under the MIT License - see the LICENSE file for details.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].