Inject ELF into remote process.
View Demo
·
Report Bug
·
Request Feature
Table of Contents
Pangolin is a program that allows to inject an ELF file into a remote process, both static & dynamically linked programs can be targeted.
- CMake
curl https://github.com/Kitware/CMake/releases/download/v3.21.0/cmake-3.21.0-linux-x86_64.sh | sh
- Clone the repo
git clone https://github.com/Hackerl/pangolin.git
- Update submodule
git submodule update --init --recursive
- Build injector
mkdir -p build && cd build && cmake .. && make
- Build shellcode
make -C shellcode && mv shellcode/lib* bin
usage: ./pangolin --pid=int --commandline=string [options] ...
options:
--daemon daemon mode
-p, --pid process id (int)
-c, --commandline commandline executed in process (string)
-e, --env environment variable (string [=])
-?, --help print this message
Start target:
./target
Inject target:
./pangolin -c "$(pwd)/inject 1 '2 3'" -e "PANGOLIN=1" -p $(pidof target)
If you want to make some threads reside in remote process, please specify daemon mode, pangolin will allocate a persistent memory as stack. In addition, after daemon thread created, call exit
syscall in main thread to end injection.
See the open issues for a list of proposed features (and known issues).
Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated.
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/AmazingFeature
) - Commit your Changes (
git commit -m 'Add some AmazingFeature'
) - Push to the Branch (
git push origin feature/AmazingFeature
) - Open a Pull Request
Distributed under the beerware License.
Hackerl - @Hackerl
Project Link: https://github.com/Hackerl/pangolin