- Status
- Offline
- Joined
- Mar 3, 2026
- Messages
- 546
- Reaction score
- 7
Found this lightweight usermode tool for quickly listing every DLL imported into a target process. If you are doing quick triage on a build to see what overlays are hooking or checking if a specific module loaded into the address space, this gets the job done without the bloat of a full-blown debugger.
Execution flow:
Since this operates in usermode, keep in mind it will likely fail to see modules loaded via advanced manual mapping where PE headers are wiped, or modules protected by anti-cheats that strip handle access. It is a solid basic utility for checking your own projects or standard application dependencies during development.
Anyone tested this on games with active AC or does it get flagged immediately?
You cant view this link please login.
You cant view this link please login.
Execution flow:
- Fire up Imported_Dll_Lister.exe.
- Type in the target process name (e.g., ProcessName.exe).
- Hit Enter and it dumps the current imports.
Since this operates in usermode, keep in mind it will likely fail to see modules loaded via advanced manual mapping where PE headers are wiped, or modules protected by anti-cheats that strip handle access. It is a solid basic utility for checking your own projects or standard application dependencies during development.
This tool is useful for verifying if your DLL is successfully injected into a target or checking for unexpected third-party modules. For heavier reversing, stick to ReClass.NET or x64dbg, but for a 5-second check, this is efficient.
Anyone tested this on games with active AC or does it get flagged immediately?