C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during RedTeam Operations to evade EDR’s.
1. Methodological Approach :
The tool basically acts on automating following stages performed for DLL Hijacking:
Discovery – Finding Potentially Vulnerable DLL Hijack paths
– Finding Potentially Vulnerable DLL Hijack paths Exploitation – Confirming whether the Confirmatory DLL was been l…