dirtyInject is a cross-platform command-line tool for injecting DLLs or shared libraries into running processes for testing and research purposes.
dll/so/dyLib Injector for educational purposes
This tool is primarily used by penetration testers and red teamers to inject malicious or custom code into target processes on Windows, Linux, and macOS environments. It facilitates process injection techniques useful for exploitation, evasion, and post-exploitation scenarios in security assessments.
This tool is intended strictly for educational and research purposes; unauthorized use may violate laws. Users should ensure they have proper permissions before injecting code into processes. Building requires CMake and a compatible build environment on the target platform.
git clone https://github.com/mendax0110/dirtyInject.git
cd dirtyInject
mkdir build
cd build
cmake ..
cmake --build .
dirtyInject.exe <dll_path/so_path/dyLib_path> <process_name>
Injects the specified DLL, SO, or dylib into the target process by name.