User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.
MIT License
User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.
1536B
and 2560B
, 32-bit
and 64-bit
version respectively, Inflame is a tiny little injector1ms
32-bit
and 64-bit
versions are actively maintainedFASM (flat assembler) for Windows is required to compile Inflame. You can get the latest version here.
Visual Studio is required to compile manual-map module - Inflame.dll
/ Inflame64.dll
. You can omit installing VS by downloading required DLL from Release section.
Clone this repo to your local machine
git clone https://github.com/danielkrupinski/Inflame.git
Inflame is available in 2 versions:
32-bit
- Inflame.asm
- for both 32-bit dll and target process64-bit
- Inflame64.asm
- for both 64-bit dll and target process.asm
file to same directory as FASM.EXE
.fasm Inflame.asm
or
fasm Inflame64.asm
flat assembler version 1.73.04 (1048576 kilobytes memory)
3 passes, 1536 bytes.
and output executable Inflame.exe
or Inflame64.exe
should exist.
manual-map
branch and open Inflame.sln
in Visual Studio 2017.Compile Inflame.dll
with x86 | Release
or x64 | Release
configuration.
Finally, copy Inflame.dll
to same directory as Inflame.exe
.
Run Inflame.exe
/Inflame64.exe
using following syntax:
Inflame / Inflame64 [injection method - see below] [path to dll or dll name when in the same folder] [process name]
Available injection method options:
-loadlibrary
- LoadLibraryA method-manual-map
- manual map method with thread hijackingValid command should look like these:
Inflame -loadlibrary test.dll Steam.exe
or
Inflame64 -manual-map test64.dll notepad.exe
Copyright (c) 2018-2019 Daniel Krupiński
This project is licensed under the MIT License - see the LICENSE file for details.