28778ab2e1
feat: attempt to load process symbol and hook it
...
fails because undefined symbol?
2023-03-29 00:43:53 +02:00
f567080751
feat: added revert method to injectors
2023-03-28 22:31:17 +02:00
1a4cd5ab3b
feat: added remote munmap
2023-03-28 22:29:56 +02:00
cbd959f487
chore: only change necessary registers
2023-03-28 22:29:33 +02:00
7c6d4f35cc
feat: added kill flag to just exit remote process
2023-03-28 22:29:08 +02:00
dadf81831c
feat: added hooks for connect and socket in so
2023-03-28 21:06:28 +02:00
d3f08ba22a
feat: working injection
...
can inject any shared object into any running process, restoring
registers and continuing execution afterwards. requires no initial
address knowledge, but must be able to PTRACE_ATTACH and read /proc/maps
of target process and the libc object used by target process. Otherwise,
offsets and paths can be specified manually from cmdline. this is by no
means optimized or reliable, just a Proof Of Concept! works tho
2023-03-28 19:11:36 +02:00
b5236f7d27
fix: keep registers after remote shellcode
2023-03-28 19:11:10 +02:00
c4fb1182f7
fix: word size is actually same as usize...
2023-03-28 19:10:37 +02:00
4a20ddbbda
chore: allow making remoteWrite with remote ptr
2023-03-28 19:10:06 +02:00
45d3f8d734
chore: display for Vec<u8>, project structure
2023-03-27 21:08:50 +02:00
29c9a403f4
chore: reordered needle again
2023-03-27 17:45:49 +02:00
4e4aceb092
feat: RemoteOp trait, RemoteShellcode struct
2023-03-27 14:40:38 +02:00
7029a048af
chore: refactored a lot, made it fancy
2023-03-27 03:39:13 +02:00
413b2a8730
chore: moved needle in subdir
2023-03-27 02:44:35 +02:00
2a9ce2e8c7
feat: PoC write on target stdout and resume
2023-03-27 02:43:29 +02:00
67cd814c99
feat: PoC execute exit syscall in target process
2023-03-26 21:03:32 +02:00
eba719fb61
feat: chad name
...
Co-authored-by: zaaarf <zaaarf@proton.me>
2023-03-25 13:33:56 +01:00
bc2b59bd1d
feat: initial work on attaching with ptrace
2023-03-25 13:27:07 +01:00
036b00a261
chore: added project files
2023-03-25 13:26:58 +01:00