Awesome
Inflame
User-mode Windows DLL injector written in Assembly language (FASM syntax) with WinAPI.
Features
- minimal size: weighing
1536B
and2560B
,32-bit
and64-bit
version respectively, Inflame is a tiny little injector - lightning fast: injection takes less than
1ms
- easy to use: invoked with Command Line options
- universal: both
32-bit
and64-bit
versions are actively maintained - safe: Inflame is safe to use and it won't harm your PC. If you don't believe - check the source code.
Getting Started
Prerequisites
FASM (flat assembler) for Windows is required to compile Inflame. You can get the latest version here.
Visual Studio is required to compile manual-map module - Inflame.dll
/ Inflame64.dll
. You can omit installing VS by downloading required DLL from Release section.
Clone
Clone this repo to your local machine
git clone https://github.com/danielkrupinski/Inflame.git
Installing
Inflame is available in 2 versions:
32-bit
-Inflame.asm
- for both 32-bit dll and target process64-bit
-Inflame64.asm
- for both 64-bit dll and target process
- Choose correct Inflame version based on dll and process architecture. See above.
- Copy chosen
.asm
file to same directory asFASM.EXE
. - Open cmd.exe there and enter following command:
fasm Inflame.asm
or
fasm Inflame64.asm
- If everything went right you should see output similar to this one:
flat assembler version 1.73.04 (1048576 kilobytes memory)
3 passes, 1536 bytes.
and output executable Inflame.exe
or Inflame64.exe
should exist.
- Then switch to
manual-map
branch and openInflame.sln
in Visual Studio 2017.
Compile Inflame.dll
with x86 | Release
or x64 | Release
configuration.
Finally, copy Inflame.dll
to same directory as Inflame.exe
.
Usage
Run Inflame.exe
/Inflame64.exe
using following syntax:
Inflame / Inflame64 [injection method - see below] [path to dll or dll name when in the same folder] [process name]
Available injection method options:
-loadlibrary
- LoadLibraryA method-manual-map
- manual map method with thread hijacking
Valid command should look like these:
Inflame -loadlibrary test.dll Steam.exe
or
Inflame64 -manual-map test64.dll notepad.exe
Acknowledgments
- Zer0Mem0ry for manual map dll injection in C++, available here.
- Microsoft for creating beloved Windows API.
License
Copyright (c) 2018-2019 Daniel Krupiński
This project is licensed under the MIT License - see the LICENSE file for details.