Welcome to The Forum
Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to
existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile
and so much more. This message will be removed once you have signed in.
Hacker from all countries join this community to share their knowledge and their hacking tools
You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.
Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.
1 post in this topic
Memory PE Injector
A tool that reads a PE file from a byte array buffer and injects it into memory.
Memory PE Injector is a C++ class which reads an executable file (PE) from a byte array and maps it into the memory space of another process. This is commonly known as Process Forking or RunPE. To accomplish this, the code follows these steps:
The code launches a second instance of the program containing the code, in suspended mode. It unmaps the PE from the virtual memory space where it is loaded The given PE byte array is then mapped in place. The process is resumed and the end result is the PE file of the byte array running instead. Usage and Tips
This code can be used in various scenarios. One of these scenarios is a case where you want to pack another program with your own one, but you'd like to deploy one executable only. You can add your second program in the resources of your first one, in an RT_RCDATA resource, then read the bytes and inject it directly into memory, without dropping it on the disk.
Injector *injector = new Injector(); unsigned char *lpByteBuffer = injector->ReadFileBytes(L"C:/The/path/to/your/executable.exe"); injector->Inject(lpByteBuffer);
Give reaction to this post to see the hidden content.