Tool for C-code injections in already compiled bins
Project description
Shooker
Tool for C-code injections in already compiled bins.
Usage
Write hook config as described in the instruction.
shooker --xml config.xml target_dir/ output_dir/
Install
pip install shooker
Please read about common errors
Example
> cd example/
> make compile
gcc -c -o target.o target.c
gcc -shared target.o -o libtarget.so
gcc -O0 -L. -Wall -o leet_add leet_add.c -ltarget
rm *.o
> make run
LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:./ ./leet_add
3713
> make hook
./../shooker ./ ./
INFO: Patching libtarget.so...
INFO: Compiling hook for add_n_print
INFO: Patching the hook(s)...
INFO: Hooking add_n_print
INFO: Lib(s) patched
> make run
LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:./ ./leet_add
Leet is 1337
To improve
- Add ability to inject to .exe/.dll
- Try to avoid sub-instruction patching mechanism in the hook(s)
- Add support of arm architecture
- Add support hooking raw binaries
- Develop true hook(not replace)
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.