A powerful application layer disassembly code injector. This tool can be used to forcibly insert a DLL module into a third-party process. It can also be used to insert a piece of ShellCode rebound backdoor, or realize the assembly-level Call function. In post-infiltration, it can also be used The backdoor can be injected directly into the memory of a specific process without leaving any traces on the disk. After the injection is successful, Metasploit can obtain the control of the target host. As long as the peer does not shut down, the authority will always be maintained, because there is no corresponding disk for memory injection file, so it will not trigger the antivirus report. It is a good command-line version of the general injection tool. DISCLAIMER THIS PROJECT IS USED ONLY…

#Application #layer #disassembly #code #injector #LyInjector

Leave a Comment

Your email address will not be published. Required fields are marked *