A python based tool that injects custom commands into windows pe files. It accomplishes this by automatically creating a new PE section, executing a hidden command, and seamlessly returning control to the original program.
- Python 3.x
pefilelibrary
python main.py <path_to_target_executable.exe>If you want to analyze the injected code cave in a debugger like x64dbg, the script prints the virtual address (VA) of the generated cave upon success.
- Open
patched.exein x64dbg. - Press
Ctrl + Gand paste the provided address.