Skip to content
/ evildll Public
forked from CrackerCat/evildll

Malicious DLL (Reverse Shell) generator for DLL Hijacking

License

Notifications You must be signed in to change notification settings

H4xl0r/evildll

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

EvilDLL v1.0

Read the license before using any part from this code :)

Malicious DLL (Win Reverse Shell) generator for DLL Hijacking

f1 f2

Features:

Reverse TCP Port Forwarding using Ngrok.io

Custom Port Forwarding option (LHOST,LPORT)

Example of DLL Hijacking included (Half-Life Launcher file)

Tested on Win7 (7601), Windows 10

Requirements:

Mingw-w64 compiler: apt-get install mingw-w64

Ngrok Authtoken (for TCP Tunneling): Sign up at: https://ngrok.com/signup

Your authtoken is available on your dashboard: https://dashboard.ngrok.com

Install your auhtoken: ./ngrok authtoken <YOUR_AUTHTOKEN>

Legal disclaimer:

Usage of EvilDLL for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program

Usage:

git clone https://github.com/thelinuxchoice/evildll
cd evildll
bash evildll.sh

Donate!

Pay me a coffee:

Paypal:

https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=CLKRT5QXXFJY4&source=url

About

Malicious DLL (Reverse Shell) generator for DLL Hijacking

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 86.2%
  • C 5.0%
  • PHP 4.7%
  • HTML 4.1%