This Python example demonstrates injecting a DLL into a target process using direct syscalls via the SysCaller bindings.
- Python 3.x (3.6+ recommended, tested with 3.12+)
SysCaller.dllpresent in the same directory and built with required exports
$ python InjectDLL.py <pid> <dll_path>
- `<pid>`: The process ID of the target process.
- `<dll_path>`: Path to the DLL you want to inject (e.g., `test.dll`).Example:
$ python InjectDLL.py 4728 test.dll- Make sure
SysCaller.dllis in the same directory asInjectDLL.pyor in your system PATH. - The DLL path can be relative or absolute; the injector will resolve it.
- Requires appropriate privileges to open the target process and inject code.
- Tested & Works only on Windows x64.