Commit graph

35 commits

Author SHA1 Message Date
86940d4732
fix: removed default features 2023-04-03 03:37:28 +02:00
d9452b3ca8
feat: pub exports of used crates 2023-04-03 03:37:18 +02:00
3fe423c2de feat: added cargo features for more modular install 2023-03-31 20:12:34 +02:00
cb0fd707b9 fix: imports changed due to crate renaming 2023-03-31 20:12:19 +02:00
8c72af16c4 chore: moved monitor module into main lib 2023-03-31 20:11:54 +02:00
8f69ce49aa fix: updated lockfile 2023-03-31 20:11:27 +02:00
49d26eda1e chore: better name! 2023-03-31 12:35:25 +02:00
da6613f6b0
chore: added lockfile 2023-03-30 06:13:12 +02:00
da45c7f025
fix: imports and deps 2023-03-30 06:12:44 +02:00
f8b85e457e
chore: removed example from lib 2023-03-30 06:12:22 +02:00
73cfe8a25a
chore: bump version 2023-03-30 05:43:30 +02:00
8b79c47b2f
chore: cleanup for library: structure and features 2023-03-30 05:41:44 +02:00
875c12cf43
chore: moved payload out, made it a usable lib 2023-03-30 05:10:11 +02:00
ecae892afb
feat: sorted modules, added tracing + basic remote
initial implementation of remote tracing via tcp as seen in
fasterthanlime, needs way more work to be reliable
2023-03-30 04:48:12 +02:00
fab29c5423
feat: search for symbols in exported but also elf
this allows finding non-exported symbols on non-stripped elfs. requires
being able to read the executable that created this process. also added
example code in C to target with this tool
2023-03-30 01:38:21 +02:00
28778ab2e1
feat: attempt to load process symbol and hook it
fails because undefined symbol?
2023-03-29 00:43:53 +02:00
f567080751
feat: added revert method to injectors 2023-03-28 22:31:17 +02:00
1a4cd5ab3b
feat: added remote munmap 2023-03-28 22:29:56 +02:00
cbd959f487
chore: only change necessary registers 2023-03-28 22:29:33 +02:00
7c6d4f35cc
feat: added kill flag to just exit remote process 2023-03-28 22:29:08 +02:00
dadf81831c
feat: added hooks for connect and socket in so 2023-03-28 21:06:28 +02:00
d3f08ba22a
feat: working injection
can inject any shared object into any running process, restoring
registers and continuing execution afterwards. requires no initial
address knowledge, but must be able to PTRACE_ATTACH and read /proc/maps
of target process and the libc object used by target process. Otherwise,
offsets and paths can be specified manually from cmdline. this is by no
means optimized or reliable, just a Proof Of Concept! works tho
2023-03-28 19:11:36 +02:00
b5236f7d27
fix: keep registers after remote shellcode 2023-03-28 19:11:10 +02:00
c4fb1182f7
fix: word size is actually same as usize... 2023-03-28 19:10:37 +02:00
4a20ddbbda
chore: allow making remoteWrite with remote ptr 2023-03-28 19:10:06 +02:00
45d3f8d734 chore: display for Vec<u8>, project structure 2023-03-27 21:08:50 +02:00
29c9a403f4 chore: reordered needle again 2023-03-27 17:45:49 +02:00
4e4aceb092 feat: RemoteOp trait, RemoteShellcode struct 2023-03-27 14:40:38 +02:00
7029a048af
chore: refactored a lot, made it fancy 2023-03-27 03:39:13 +02:00
413b2a8730
chore: moved needle in subdir 2023-03-27 02:44:35 +02:00
2a9ce2e8c7
feat: PoC write on target stdout and resume 2023-03-27 02:43:29 +02:00
67cd814c99
feat: PoC execute exit syscall in target process 2023-03-26 21:03:32 +02:00
eba719fb61
feat: chad name
Co-authored-by: zaaarf <zaaarf@proton.me>
2023-03-25 13:33:56 +01:00
bc2b59bd1d
feat: initial work on attaching with ptrace 2023-03-25 13:27:07 +01:00
036b00a261
chore: added project files 2023-03-25 13:26:58 +01:00