EvilDLL v1.0
Malicious DLL (Win Reverse Shell) generator for DLL Hijacking
![[Image: 78950022-d9c44d00-7aa3-11ea-9ae3-e26f667fede3.jpg]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fuser-images.githubusercontent.com%2F34893261%2F78950022-d9c44d00-7aa3-11ea-9ae3-e26f667fede3.jpg)
![[Image: 78950029-e052c480-7aa3-11ea-844c-667347ba29f7.jpg]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fuser-images.githubusercontent.com%2F34893261%2F78950029-e052c480-7aa3-11ea-844c-667347ba29f7.jpg)
Features:
Reverse TCP Port Forwarding using Ngrok.io
Custom Port Forwarding option (LHOST,LPORT)
Example of DLL Hijacking included (Half-Life Launcher file)
Tested on Win7 (7601), Windows 10
Requirements:
Mingw-w64 compiler: apt-get install mingw-w64
Ngrok Authtoken (for TCP Tunneling): Sign up at: https://ngrok.com/signup
Your authtoken is available on your dashboard: https://dashboard.ngrok.com
Install your auhtoken: ./ngrok
authtoken <YOUR_AUTHTOKEN>
Malicious DLL (Win Reverse Shell) generator for DLL Hijacking
![[Image: 78950022-d9c44d00-7aa3-11ea-9ae3-e26f667fede3.jpg]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fuser-images.githubusercontent.com%2F34893261%2F78950022-d9c44d00-7aa3-11ea-9ae3-e26f667fede3.jpg)
![[Image: 78950029-e052c480-7aa3-11ea-844c-667347ba29f7.jpg]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fuser-images.githubusercontent.com%2F34893261%2F78950029-e052c480-7aa3-11ea-844c-667347ba29f7.jpg)
Features:
Reverse TCP Port Forwarding using Ngrok.io
Custom Port Forwarding option (LHOST,LPORT)
Example of DLL Hijacking included (Half-Life Launcher file)
Tested on Win7 (7601), Windows 10
Requirements:
Mingw-w64 compiler: apt-get install mingw-w64
Ngrok Authtoken (for TCP Tunneling): Sign up at: https://ngrok.com/signup
Your authtoken is available on your dashboard: https://dashboard.ngrok.com
Install your auhtoken: ./ngrok
authtoken <YOUR_AUTHTOKEN>