infection framework for processes
Find a file
alemi d3f08ba22a
feat: working injection
can inject any shared object into any running process, restoring
registers and continuing execution afterwards. requires no initial
address knowledge, but must be able to PTRACE_ATTACH and read /proc/maps
of target process and the libc object used by target process. Otherwise,
offsets and paths can be specified manually from cmdline. this is by no
means optimized or reliable, just a Proof Of Concept! works tho
2023-03-28 19:11:36 +02:00
src feat: working injection 2023-03-28 19:11:36 +02:00
.editorconfig chore: added project files 2023-03-25 13:26:58 +01:00
.gitignore chore: added project files 2023-03-25 13:26:58 +01:00
.rustfmt.toml chore: added project files 2023-03-25 13:26:58 +01:00
Cargo.toml feat: working injection 2023-03-28 19:11:36 +02:00