4546d6b0fe
feat: allow to spawn and then infect processes
2023-07-08 02:01:26 +02:00
e5d55984d0
fix: is there a nicer way?
2023-04-03 03:50:37 +02:00
86940d4732
fix: removed default features
2023-04-03 03:37:28 +02:00
d9452b3ca8
feat: pub exports of used crates
2023-04-03 03:37:18 +02:00
3fe423c2de
feat: added cargo features for more modular install
2023-03-31 20:12:34 +02:00
cb0fd707b9
fix: imports changed due to crate renaming
2023-03-31 20:12:19 +02:00
8c72af16c4
chore: moved monitor module into main lib
2023-03-31 20:11:54 +02:00
8f69ce49aa
fix: updated lockfile
2023-03-31 20:11:27 +02:00
49d26eda1e
chore: better name!
2023-03-31 12:35:25 +02:00
da6613f6b0
chore: added lockfile
2023-03-30 06:13:12 +02:00
da45c7f025
fix: imports and deps
2023-03-30 06:12:44 +02:00
f8b85e457e
chore: removed example from lib
2023-03-30 06:12:22 +02:00
73cfe8a25a
chore: bump version
2023-03-30 05:43:30 +02:00
8b79c47b2f
chore: cleanup for library: structure and features
2023-03-30 05:41:44 +02:00
875c12cf43
chore: moved payload out, made it a usable lib
2023-03-30 05:10:11 +02:00
ecae892afb
feat: sorted modules, added tracing + basic remote
...
initial implementation of remote tracing via tcp as seen in
fasterthanlime, needs way more work to be reliable
2023-03-30 04:48:12 +02:00
fab29c5423
feat: search for symbols in exported but also elf
...
this allows finding non-exported symbols on non-stripped elfs. requires
being able to read the executable that created this process. also added
example code in C to target with this tool
2023-03-30 01:38:21 +02:00
28778ab2e1
feat: attempt to load process symbol and hook it
...
fails because undefined symbol?
2023-03-29 00:43:53 +02:00
f567080751
feat: added revert method to injectors
2023-03-28 22:31:17 +02:00
1a4cd5ab3b
feat: added remote munmap
2023-03-28 22:29:56 +02:00
cbd959f487
chore: only change necessary registers
2023-03-28 22:29:33 +02:00
7c6d4f35cc
feat: added kill flag to just exit remote process
2023-03-28 22:29:08 +02:00
dadf81831c
feat: added hooks for connect and socket in so
2023-03-28 21:06:28 +02:00
d3f08ba22a
feat: working injection
...
can inject any shared object into any running process, restoring
registers and continuing execution afterwards. requires no initial
address knowledge, but must be able to PTRACE_ATTACH and read /proc/maps
of target process and the libc object used by target process. Otherwise,
offsets and paths can be specified manually from cmdline. this is by no
means optimized or reliable, just a Proof Of Concept! works tho
2023-03-28 19:11:36 +02:00
b5236f7d27
fix: keep registers after remote shellcode
2023-03-28 19:11:10 +02:00
c4fb1182f7
fix: word size is actually same as usize...
2023-03-28 19:10:37 +02:00
4a20ddbbda
chore: allow making remoteWrite with remote ptr
2023-03-28 19:10:06 +02:00
45d3f8d734
chore: display for Vec<u8>, project structure
2023-03-27 21:08:50 +02:00
29c9a403f4
chore: reordered needle again
2023-03-27 17:45:49 +02:00
4e4aceb092
feat: RemoteOp trait, RemoteShellcode struct
2023-03-27 14:40:38 +02:00
7029a048af
chore: refactored a lot, made it fancy
2023-03-27 03:39:13 +02:00
413b2a8730
chore: moved needle in subdir
2023-03-27 02:44:35 +02:00
2a9ce2e8c7
feat: PoC write on target stdout and resume
2023-03-27 02:43:29 +02:00
67cd814c99
feat: PoC execute exit syscall in target process
2023-03-26 21:03:32 +02:00
eba719fb61
feat: chad name
...
Co-authored-by: zaaarf <zaaarf@proton.me>
2023-03-25 13:33:56 +01:00
bc2b59bd1d
feat: initial work on attaching with ptrace
2023-03-25 13:27:07 +01:00
036b00a261
chore: added project files
2023-03-25 13:26:58 +01:00