infection framework for processes
alemi
d3f08ba22a
can inject any shared object into any running process, restoring registers and continuing execution afterwards. requires no initial address knowledge, but must be able to PTRACE_ATTACH and read /proc/maps of target process and the libc object used by target process. Otherwise, offsets and paths can be specified manually from cmdline. this is by no means optimized or reliable, just a Proof Of Concept! works tho |
||
---|---|---|
src | ||
.editorconfig | ||
.gitignore | ||
.rustfmt.toml | ||
Cargo.toml |