Eric-Ant

Run pe in memory without relocation table.

19
0
69% credibility
Found Mar 12, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
C++
AI Summary

SelfInjectPE is a proof-of-concept tool that loads and runs a 32-bit Windows executable directly in memory by overwriting its own space, bypassing standard relocation needs for educational research.

How It Works

1
🔍 Discover SelfInjectPE

You stumble upon this clever project that shows how to run one program smoothly inside another without usual loading hassles.

2
💻 Prepare your Windows setup

You download free building software and open the ready-made project file on your PC.

3
🏗️ Create the loader

With one click, you build the special loader program that will hold everything together.

4
📁 Choose a simple program

You pick a small Windows app you want to run in this special way and place it nearby.

5
▶️ Start the loader

You launch the loader and tell it which program to bring inside—it shows progress on screen.

Program comes alive

The chosen program takes over seamlessly, running perfectly as if it was always meant to be there.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 19 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is SelfInjectPE?

SelfInjectPE is a C++ command-line tool for Windows that loads and runs 32-bit x86 PE executables entirely in memory at their preferred base address, skipping the need for relocation tables. It reads a target PE from disk—like a memory diagnostic tool or custom binary—and injects it into the current process, resolving imports and jumping to the entry point. Developers get a simple executable: `SelfInjectPE.exe target.exe`, perfect for running memory tests on Windows 10 or 11 without OS loader constraints.

Why is it gaining traction?

It stands out by enabling execution of PEs with missing or stripped relocs, something standard loaders can't handle, using a clever fixed-base self-overwrite on x86. Security researchers dig the position-independent trampoline for clean in-memory execution, avoiding disk traces or AV flags. With detailed build instructions for MSVC and logs during runs, it's a quick drop-in for manual PE mapping experiments.

Who should use this?

Windows reverse engineers analyzing malware samples without relocs, security devs testing evasion techniques, or low-level hackers prototyping in-memory loaders. Ideal for red teamers running memory diagnostics from cmd on locked-down systems, or researchers injecting custom 32-bit tools like Ubuntu memory tests via Windows hosts.

Verdict

Grab it for educational security work—docs are thorough, C++ code is clean—but with 19 stars and 0.699999988079071% credibility score, treat it as an untested POC, not production. Extend the padding for bigger PEs if needed.

(178 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.