mavlevin.com/2020/04/11/calling-arbitrary-functions-in-exes-3a-performing-calls-to-exe-functions-like-dll-exports
Preview meta tags from the mavlevin.com website.
Linked Hostnames
7- 22 links tomavlevin.com
- 5 links todocs.microsoft.com
- 5 links togithub.com
- 3 links totwitter.com
- 1 link tomedium.com
- 1 link toprofiles.stanford.edu
- 1 link towww.linkedin.com
Thumbnail

Search Engine Appearance
Calling Arbitrary Functions In EXEs: Performing Calls to EXE Functions Like DLL Exports
When reversing or fuzzing an executable, being able to run an arbitrary function with controlled data is extremely helpful. A dll (Dynamic Linked Library) with our target function would allow us to conveniently review and test the function as we wish. The only problem is that usually the function we want to examine resides in an exe, not a dll. Converting an exe to a dll is a doable. After all, both an exe and a dll share the same PE file format.
Bing
Calling Arbitrary Functions In EXEs: Performing Calls to EXE Functions Like DLL Exports
When reversing or fuzzing an executable, being able to run an arbitrary function with controlled data is extremely helpful. A dll (Dynamic Linked Library) with our target function would allow us to conveniently review and test the function as we wish. The only problem is that usually the function we want to examine resides in an exe, not a dll. Converting an exe to a dll is a doable. After all, both an exe and a dll share the same PE file format.
DuckDuckGo
Calling Arbitrary Functions In EXEs: Performing Calls to EXE Functions Like DLL Exports
When reversing or fuzzing an executable, being able to run an arbitrary function with controlled data is extremely helpful. A dll (Dynamic Linked Library) with our target function would allow us to conveniently review and test the function as we wish. The only problem is that usually the function we want to examine resides in an exe, not a dll. Converting an exe to a dll is a doable. After all, both an exe and a dll share the same PE file format.
General Meta Tags
8- titleCalling Arbitrary Functions In EXEs: Performing Calls to EXE Functions Like DLL Exports | mavlevin
- charsetutf-8
- viewportwidth=device-width, initial-scale=1, minimum-scale=0.5, maximum-scale=5
- generatorJekyll v4.3.4
- authorMav Levin
Open Graph Meta Tags
8- og:imagehttps://mavlevin.com/assets/img/whtaguy_research_bg.png
- og:typewebsite
- og:titleCalling Arbitrary Functions In EXEs: Performing Calls to EXE Functions Like DLL Exports
og:locale
en_US- og:descriptionWhen reversing or fuzzing an executable, being able to run an arbitrary function with controlled data is extremely helpful. A dll (Dynamic Linked Library) with our target function would allow us to conveniently review and test the function as we wish. The only problem is that usually the function we want to examine resides in an exe, not a dll. Converting an exe to a dll is a doable. After all, both an exe and a dll share the same PE file format.
Twitter Meta Tags
6- twitter:cardsummary
- twitter:titleCalling Arbitrary Functions In EXEs: Performing Calls to EXE Functions Like DLL Exports
- twitter:descriptionMotivationWhen reversing or fuzzing an executable, being able to run an arbitrary function with controlled data is extremely helpful. Through iteratively pla...
- twitter:cardsummary
- twitter:imagehttps://mavlevin.com/assets/img/whtaguy_research_bg.png
Link Tags
5- alternatehttps://mavlevin.com/feed.xml
- alternatehttps://mavlevin.com/feed.xml
- canonicalhttps://mavlevin.com/2020/04/11/Calling-Arbitrary-Functions-In-EXEs-3A-Performing-Calls-to-EXE-Functions-Like-DLL-Exports.html
- shortcut icon/assets/favicon.ico
- stylesheet/assets/css/main.css
Links
38- https://docs.microsoft.com/en-us/cpp/cpp/stdcall?view=vs-2019
- https://docs.microsoft.com/en-us/windows/win32/api/libloaderapi/nf-libloaderapi-loadlibrarya
- https://docs.microsoft.com/en-us/windows/win32/debug/pe-format#characteristics
- https://docs.microsoft.com/en-us/windows/win32/debug/pe-format#optional-header-standard-fields-image-only
- https://docs.microsoft.com/en-us/windows/win32/dlls/dllmain