/pangolin

Inject ELF into remote process

Primary LanguageC++

Contributors Forks Stargazers Issues


Pangolin

Inject ELF into remote process.

Report Bug · Request Feature

Table of Contents
  1. About The Project
  2. Getting Started
  3. Usage
  4. Roadmap
  5. Contributing
  6. License
  7. Contact
  8. Acknowledgements

About The Project

Pangolin is a program that allows to inject an ELF file into a remote process, both static & dynamically linked programs can be targeted.

Built With

Getting Started

Prerequisites

  • CMake
    curl https://github.com/Kitware/CMake/releases/download/v3.21.0/cmake-3.21.0-linux-x86_64.sh | sh

Installation

  1. Clone the repo
    git clone https://github.com/Hackerl/pangolin.git
  2. Update submodule
    git submodule update --init --recursive
  3. Build shellcode
    make -C shellcode
  4. Build injector
    mkdir -p build && cd build && cmake .. && make

Usage

usage: pangolin [options] pid(int) ... inject argv ...
positional:
        pid                 process id(int)
optional:
        -?, --help          print help message
        -d, --daemon        daemon mode
        -e, --environs      environment variables(string[])

Start target:

./target

Inject target:

./pangolin -e "PANGOLIN=1" $(pidof target) $(pwd)/inject 1 "2 3"

If you want to make some threads reside in remote process, please specify daemon mode, pangolin will allocate a persistent memory as stack. In addition, after daemon thread created, call exit syscall in main thread to end injection.

Roadmap

See the open issues for a list of proposed features (and known issues).

Contributing

Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated.

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

License

Distributed under the beerware License.

Contact

Hackerl - @Hackerl

Project Link: https://github.com/Hackerl/pangolin

Acknowledgements