Running code inside a loaded process may seem something that only hackers do, but in programming and application development this technique, called injection, is not uncommon. DLL injection can be done by means of a third-party program and among those able to carry out this task you can find Injector.
This software works in a simple manner and its looks are very much in concordance with the visual aspect. A simple window enables users to choose the Dynamic Link Library and load it with a couple of clicks.
As soon as a DLL is chosen, the list of currently running processes becomes active. The rest of the operation is quite easy to guess, as all you have to do is tick each checkbox near those in which the library will be injected.
Removing the Dynamic Link Library from the processes it is associated with is just a simple task. By unchecking the boxes, the DLL will be ejected from those processes.
The list is set to automatic refresh by default, but this option is also customizable so you can manually scan for newly started processes. The information Injector supplies concerning the items on that list is scarce, as you can only see the image name and the process identifier (PID).
To sum things up, it's safe to say that this application provides a very straightforward way of attaching a DLL to a running process. The operation is simple enough for less experienced users to try, yet the technique favors expert users who really need to use this code injection procedure.