Commit graph

12 commits

Author SHA1 Message Date
d3f08ba22a
feat: working injection
can inject any shared object into any running process, restoring
registers and continuing execution afterwards. requires no initial
address knowledge, but must be able to PTRACE_ATTACH and read /proc/maps
of target process and the libc object used by target process. Otherwise,
offsets and paths can be specified manually from cmdline. this is by no
means optimized or reliable, just a Proof Of Concept! works tho
2023-03-28 19:11:36 +02:00
b5236f7d27
fix: keep registers after remote shellcode 2023-03-28 19:11:10 +02:00
c4fb1182f7
fix: word size is actually same as usize... 2023-03-28 19:10:37 +02:00
4a20ddbbda
chore: allow making remoteWrite with remote ptr 2023-03-28 19:10:06 +02:00
45d3f8d734 chore: display for Vec<u8>, project structure 2023-03-27 21:08:50 +02:00
29c9a403f4 chore: reordered needle again 2023-03-27 17:45:49 +02:00
4e4aceb092 feat: RemoteOp trait, RemoteShellcode struct 2023-03-27 14:40:38 +02:00
7029a048af
chore: refactored a lot, made it fancy 2023-03-27 03:39:13 +02:00
413b2a8730
chore: moved needle in subdir 2023-03-27 02:44:35 +02:00
2a9ce2e8c7
feat: PoC write on target stdout and resume 2023-03-27 02:43:29 +02:00
67cd814c99
feat: PoC execute exit syscall in target process 2023-03-26 21:03:32 +02:00
bc2b59bd1d
feat: initial work on attaching with ptrace 2023-03-25 13:27:07 +01:00