Automated DLL Hijacking Discovery, Validation, and Confirmation
Turning local misconfigurations into weaponized, confirmed attack paths.
DLLHijackHunter is an automated Windows DLL hijacking detection tool that goes beyond static analysis. It discovers, validates, and confirms DLL hijacking opportunities using a multi-phase pipeline:
- Discovery — Enumerates binaries across services, scheduled tasks, startup items, COM objects, and AutoElevate UAC bypass vectors
- Filtration — Eliminates false positives through intelligent hard and soft gates
- Canary Confirmation — Deploys a harmless canary DLL and triggers the binary to prove the hijack works
- Scoring & Reporting — Ranks findings by exploitability with a tiered confidence system
Most DLL hijacking tools stop at “this DLL might be hijackable.” DLLHijackHunter attempts to validate it, cross-reference it against known exploit intelligence, and confirm real execution paths where possible.
flowchart TB
subgraph Phase1["Phase 1: Discovery"]
SE["Static Engine<br/>Services, Tasks, Startup,<br/>COM, Run Keys"]
AE["AutoElevate Engine<br/>Manifest + COM UAC Bypass"]
PE["PE Analyzer<br/>Import Tables, Delay Loads,<br/>Manifests, Exports"]
ETW["ETW Engine<br/>Real-time DLL Load<br/>Monitoring"]
SO["Search Order<br/>Calculator"]
end
subgraph Phase2["Phase 2: Filter Pipeline"]
direction LR
HG["Hard Gates<br/>(Binary Kill)"]
SG["Soft Gates<br/>(Confidence Adj.)"]
end
subgraph Phase3["Phase 3: Canary"]
CB["Canary DLL Builder"]
TE["Trigger Executor"]
VF["Verification"]
end
subgraph Phase4["Phase 4: Output"]
SC["Tiered Scorer"]
RC["Console Report"]
RJ["JSON Report"]
RH["HTML Report"]
end
SE --> PE --> SO
AE --> PE
ETW --> SO
SO --> Phase2
HG --> SG
Phase2 --> Phase3
CB --> TE --> VF
Phase3 --> Phase4
| Type | Description | Stealth |
|---|---|---|
| Phantom | DLL doesn't exist anywhere on disk | High |
| Search Order | Place DLL earlier in the Windows search order | High |
| Side-Loading | Abuse legitimate app loading DLLs from its directory | High |
| .local Redirect | Hijack via .local directory redirection |
High |
| KnownDLL Bypass | Attempt bypass via .local or WoW64 edge cases |
Medium |
| ENV PATH | Weaponization of writable directories in system PATH |
High |
| CWD | Current Working Directory hijack | Low |
| AppInit DLLs | AppInit_DLLs registry abuse |
Low |
| IFEO | Image File Execution Options debugger abuse | Medium |
| AppCert DLLs | AppCertDLLs registry hijack |
Low |
DLLHijackHunter includes dedicated UAC bypass discovery:
- Manifest AutoElevate — Scans
System32andSysWOW64for EXEs with<autoElevate>true</autoElevate>in embedded manifests - COM AutoElevation — Scans
HKLM\SOFTWARE\Classes\CLSIDfor COM objects withElevation\Enabled=1 - Side-Load Simulation — For AutoElevate binaries that do not call
SetDllDirectoryorSetDefaultDllDirectories, simulates the “copy EXE to writable folder + drop DLL” attack path
- Targeted vulnerability mapping — Cross-references discovered imports against an offline dictionary of known vulnerable software patterns (for example, HijackLibs-style matches)
- Automated PATH exploitation — Evaluates writable
PATHfolders and generates hijack candidates for native Windows services that searchPATHfor missing DLLs - Expanded phantom DLL hunting — Searches for a broad library of high-value phantom DLL opportunities across multiple categories
The pipeline reduces false positives through two stages:
Hard Gates
- API set schema filtering (
api-ms-*,ext-ms-*) - KnownDLL filtering
- ACL-based writability validation
Soft Gates
- WinSxS manifest penalty
- Privilege delta analysis
LoadLibraryExmitigation checks- Signature validation checks
- Graceful error-handling penalties
Instead of guessing, DLLHijackHunter attempts to prove hijacks work:
sequenceDiagram
participant H as DLLHijackHunter
participant B as Canary DLL Builder
participant T as Trigger Executor
participant V as Victim Binary
H->>B: Build canary DLL
B->>B: Compile with MSVC (cl.exe)
B-->>H: canary.dll + confirmation file path
H->>H: Place DLL at hijack path
H->>T: Trigger binary execution
T->>V: Start service / run task / COM activate
V->>V: Loads canary DLL
V-->>H: Writes confirmation file<br/>PID, privilege, integrity level
H->>H: Record: CONFIRMED
H->>H: Cleanup canary DLL
The canary DLL:
- Is built with MSVC (
cl.exe) - Uses a file-based confirmation mechanism
- Captures execution metadata such as user, integrity level, and privilege indicators
- Contains no malicious payload; it is strictly a detection and validation mechanism
Proxy/export-forwarding canaries are experimental and best-effort. Some targets may fail to load correctly or may behave unexpectedly depending on:
- ordinal-only exports
- decorated export names
- calling convention mismatches
- loader/runtime assumptions in the target process
That means a failed proxy canary does not always mean the underlying hijack path is impossible.
| Feature | DLLHijackHunter | Robber | DLLSpy | WinPEAS | Procmon |
|---|---|---|---|---|---|
| Automated discovery | ✅ | ✅ | ✅ | ✅ | ❌ |
| Phantom DLL detection | ✅ | ❌ | ✅ | ❌ | ✅ |
| Search order analysis | ✅ | ❌ | ❌ | ❌ | ❌ |
| ACL-based writability check | ✅ | Partial | ❌ | Basic | ❌ |
| ETW real-time monitoring | ✅ | ❌ | ❌ | ❌ | ✅ |
| Canary confirmation | ✅ | ❌ | ❌ | ❌ | ❌ |
| Privilege escalation check | ✅ | ❌ | ❌ | ❌ | ❌ |
| UAC bypass discovery | ✅ | ❌ | ❌ | ❌ | ❌ |
| False positive reduction | ✅ | None | Basic | None | None |
| Reboot persistence check | ✅ | ❌ | ❌ | ❌ | ❌ |
| Proxy DLL generation | ✅ | ❌ | ❌ | ❌ | ❌ |
| Confidence scoring | ✅ | ❌ | ❌ | ❌ | ❌ |
| Auto trigger (svc/task/COM) | ✅ | ❌ | ❌ | ❌ | ❌ |
| HTML/JSON reporting | ✅ | ❌ | ❌ | TXT | ❌ |
| Threat intel correlation | ✅ | ❌ | ❌ | ❌ | ❌ |
| Automated PATH exploits | ✅ | ❌ | ❌ | ❌ | ❌ |
| Target-specific scanning | ✅ | ❌ | ❌ | ❌ | ✅ |
| Self-contained binary | ✅ | ❌ | ❌ | ✅ | ❌ |
- Windows 10/11 or Windows Server 2016+
- .NET 8.0 Runtime (or use a self-contained build)
- Administrator privileges recommended (required for ETW, canary deployment, and some service triggers)
git clone https://github.com/ghostvectoracademy/DLLHijackHunter.git
cd DLLHijackHunter
# Build (self-contained single file)
dotnet publish src/DLLHijackHunter/DLLHijackHunter.csproj `
-c Release -r win-x64 --self-contained `
-p:PublishSingleFile=true -o ./publish
# Or use the build script
.\build.ps1# Full aggressive scan (recommended, requires admin)
.\DLLHijackHunter.exe --profile aggressive
# Safe scan (no file drops, no triggers)
.\DLLHijackHunter.exe --profile safe
# UAC bypass focused scan
.\DLLHijackHunter.exe --profile uac-bypass
# Target a specific binary
.\DLLHijackHunter.exe --target "C:\Program Files\MyApp\app.exe"
# Target by filename (partial match)
.\DLLHijackHunter.exe --target notepad.exe
# Confirmed findings only
.\DLLHijackHunter.exe --profile redteam --format json -o report.jsonDLLHijackHunter — Automated DLL Hijacking Detection
Options:
-p, --profile <profile> Scan profile [default: aggressive]
aggressive | strict | safe | redteam | uac-bypass
-o, --output <path> Output file path (auto-detects format)
-f, --format <format> Output format [default: console]
console | json | html
-t, --target <target> Target specific binary, directory, or filename
--min-confidence <value> Minimum confidence threshold 0-100 [default: 20]
--no-canary Disable canary confirmation
--no-etw Disable ETW runtime discovery
--confirmed-only Only show canary-confirmed findings
-v, --verbose Verbose output
| Profile | Use Case | Canary | ETW | UAC Bypass | Min Confidence | Triggers |
|---|---|---|---|---|---|---|
| aggressive | Full audit, lab environments | ✅ | ✅ | ✅ | 15% | Services, Tasks, COM |
| strict | High-confidence findings only | ✅ | ✅ | ❌ | 80% | Services, Tasks |
| safe | Production systems, read-only | ❌ | ❌ | ❌ | 50% | None |
| redteam | Confirmed exploitable only | ✅ | ✅ | ❌ | 50% | Services, Tasks, COM |
| uac-bypass | UAC bypass vectors only | ❌ | ❌ | ✅ | 20% | AutoElevate only |
Each finding receives confidence and impact signals that are combined into a final prioritization tier.
Typical impact considerations include:
- privilege gained
- trigger reliability
- stealth
- reboot persistence
Confirmed canary execution should be treated as the strongest validation signal.
DLLHijackHunter is designed for defensive security research, lab validation, auditing, and red-team simulation in authorized environments.
Use it only on systems and networks you own or are explicitly authorized to assess.
- Canary mode writes test DLLs to candidate locations
- Some triggers may briefly start or stop services/tasks during validation
- Proxy/export-forwarding canaries may destabilize fragile targets
- Safe profile is the preferred mode for production triage when file drops and triggers are not acceptable
DLLHijackHunter supports:
- console reporting
- JSON export
- HTML export
Recommended workflow:
- run a broad scan
- review high-confidence findings
- use canary confirmation selectively on high-value paths
- preserve JSON/HTML output for reporting and triage
MIT
Built by GhostVector Academy.