Skip to main content

Tool for C-code injections in already compiled bins

Project description

Shooker

Tool for C-code injections in already compiled bins.

Usage

Write hook config as described in the instruction.

shooker --xml config.xml target_dir/ output_dir/

Install

pip install shooker
Please read about common errors

Example

> cd example/
> make compile
gcc -c -o target.o target.c
gcc -shared target.o -o libtarget.so
gcc -O0 -L. -Wall -o leet_add leet_add.c -ltarget
rm *.o
> make run
LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:./ ./leet_add
3713
> make hook
./../shooker ./ ./
INFO: Patching libtarget.so...
INFO: Compiling hook for add_n_print
INFO: Patching the hook(s)...
INFO: Hooking add_n_print
INFO: Lib(s) patched
> make run
LD_LIBRARY_PATH=${LD_LIBRARY_PATH}:./ ./leet_add
Leet is 1337

To improve

  • Add ability to inject to .exe/.dll
  • Try to avoid sub-instruction patching mechanism in the hook(s)
  • Add support of arm architecture
  • Add support hooking raw binaries
  • Develop true hook(not replace)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

shooker-1.1.4.tar.gz (8.0 kB view hashes)

Uploaded Source

Built Distribution

shooker-1.1.4-py3-none-any.whl (9.1 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page