Skip to content

paskalian/Standby

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

38 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

STANDBY LOGO

Configurable easy to use DLL injector powered by Dear ImGui


Menu


LEGAL NOTICE

I do not take responsibility for any misuse of this DLL injector in any way.

Compatibility

Compatible with both x64 and x86 processes, you must use the specific version for a process that is x64 or x86 respectively.

Usage

The Standby DLL injector consists of 4 parts;

  1. Configuring (Can be skipped in simple usage)
  2. Process selection
  3. Dll selection
  4. Injection

Configuring

By clicking on configure you will be granted with a configuration window which you can change the program behaviour from. In here you can change which functions or methods will be used and which actions will be taken by the program while process selection and injection.

  • If handle retrieval is selected as Handle Hijacking then the injector will hijack the handle instead of opening one itself.
  • If mapping is selected as Manual Mapping then the injector will map the dll file itself to the target process, so the dll won't be seen in the module list etc. (Can still be found though)
  • Functions ending with (IMP) are functions which we are invoking ourselves.
  • If remote thread mode is selected as Thread Hijacking then the injector will hijack the thread from the target process instead of creating one itself. Currently it may not be a very safe option. Also don't forget that the hijacked thread can be any thread of the target process (usually main) and doesn't have the must to be running when it was hijacked. For summary even though you hijacked the thread, if it was in a sleep state it won't execute the shellcode until it exits that sleep state.
  • Unlink from peb option basically removes the dll entry from the loaded dll list of the target process, useless if manually mapped since it won't be in there anyways.
  • Delete PE header option basically deletes the entire PE header after injection from the target process memory.

Process Selection

By clicking on 'No Process Selected' you will be granted with a process selection window which you can select your target process from. After you select your process you must click Select, this will open up an confirm window - since this action will open a handle to the target process - and after confirming the program will open a handle to target process using your configurations and display basic information about it.

Dll Selection

By clicking on insert you will be granted with a file selection window which you can select your .dll file to be used by the program, do not forget that you have to select that .dll file while injecting in the upper window.

By clicking on remove the program will delete that entry from the dll list.

Injection

By clicking on inject the program will start to inject the dll using your configurations.

About

Configurable easy to use dll injector.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published