Skip to content

Loads an Executable from a byte array in Memory. Allows the Executable to not be Present in the File System during Runtime and can be Used to Load the Executable in Another Process. Could be used to Avoid AntiVirus and AntiCheat Detection. In Conclusion we just Manual Map an Executable

Notifications You must be signed in to change notification settings

vernthedragon/EmbeddedExecutable

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 

Repository files navigation

EmbeddedExecutable

Loads an Executable from a byte array in Memory The Executable does not need to be present in the File System

Could also be used to Load the Executable in the Address Space of Another Process (The Executable will not be present in ProcessList and will run under the Process Name of the Victim Process (Could be used to bypass a few AntiVirus and AntiCheats since they usually check for manual map DLLs not EXEs))

In Conclusion, we basically manual map an Executable

About

Loads an Executable from a byte array in Memory. Allows the Executable to not be Present in the File System during Runtime and can be Used to Load the Executable in Another Process. Could be used to Avoid AntiVirus and AntiCheat Detection. In Conclusion we just Manual Map an Executable

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published