Utility for injecting executable code into a running process on x86/x64 Linux
Utility for injecting executable code into a running process on x86/x64 Linux. It uses
ptrace()to attach to a process, then
mmap()'s memory regions for the injected code, a new stack, and space for trampoline shellcode. Finally, the trampoline in the target process is used to create a new thread and execute the chosen shellcode, so the main thread is allowed to continue. This project borrows from a number of other projects and research, see References below.
With fasm installed in your
PATH, simply run:
clone(), clone syscall with inline assembly.
./injector 1234 print64.bin
I plan on expanding this project to be a full ELF shared library injector. While this tool could theoretically be used as-is to inject a statically-compiled, position-independent ELF library, I want to be able to parse libraries with dynamically-loaded dependencies and load those dependencies as part of the injection process. The following resources are a useful starting point: * Injectso * Dynamically inject a shared library into a running process on Android/ARM * ELF file format * The Inside Story on Shared Libraries and Dynamic Loading
Copyright (c) 2015, Dan Staples. This code is available under the GNU General Public License, version 3.