Commit graph

15 commits

Author SHA1 Message Date
86940d4732
fix: removed default features 2023-04-03 03:37:28 +02:00
3fe423c2de feat: added cargo features for more modular install 2023-03-31 20:12:34 +02:00
49d26eda1e chore: better name! 2023-03-31 12:35:25 +02:00
73cfe8a25a
chore: bump version 2023-03-30 05:43:30 +02:00
8b79c47b2f
chore: cleanup for library: structure and features 2023-03-30 05:41:44 +02:00
875c12cf43
chore: moved payload out, made it a usable lib 2023-03-30 05:10:11 +02:00
ecae892afb
feat: sorted modules, added tracing + basic remote
initial implementation of remote tracing via tcp as seen in
fasterthanlime, needs way more work to be reliable
2023-03-30 04:48:12 +02:00
fab29c5423
feat: search for symbols in exported but also elf
this allows finding non-exported symbols on non-stripped elfs. requires
being able to read the executable that created this process. also added
example code in C to target with this tool
2023-03-30 01:38:21 +02:00
28778ab2e1
feat: attempt to load process symbol and hook it
fails because undefined symbol?
2023-03-29 00:43:53 +02:00
dadf81831c
feat: added hooks for connect and socket in so 2023-03-28 21:06:28 +02:00
d3f08ba22a
feat: working injection
can inject any shared object into any running process, restoring
registers and continuing execution afterwards. requires no initial
address knowledge, but must be able to PTRACE_ATTACH and read /proc/maps
of target process and the libc object used by target process. Otherwise,
offsets and paths can be specified manually from cmdline. this is by no
means optimized or reliable, just a Proof Of Concept! works tho
2023-03-28 19:11:36 +02:00
413b2a8730
chore: moved needle in subdir 2023-03-27 02:44:35 +02:00
67cd814c99
feat: PoC execute exit syscall in target process 2023-03-26 21:03:32 +02:00
eba719fb61
feat: chad name
Co-authored-by: zaaarf <zaaarf@proton.me>
2023-03-25 13:33:56 +01:00
036b00a261
chore: added project files 2023-03-25 13:26:58 +01:00