Simple DLL Manual Mapper that uses frequently used iat functions to execute shellcode. Program doesn't create any threads.
- Gets address of
TranslateMessage
- Replaces address of hooked function with shellcode
- Maps DLL into the remote process's memory
- Writes back address of hooked function
- Open executable normally.
- pass arguments via command line. (injector64.exe )
You can use Kernel Mode DLL Injector for similiar and extended program.