https://github.com/davidbuchanan314/shellinject
Spawn a reverse TCP shell in the context of another Linux process
https://github.com/davidbuchanan314/shellinject
Last synced: 16 days ago
JSON representation
Spawn a reverse TCP shell in the context of another Linux process
- Host: GitHub
- URL: https://github.com/davidbuchanan314/shellinject
- Owner: DavidBuchanan314
- License: mit
- Created: 2020-08-12T12:36:28.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2021-08-05T06:15:55.000Z (over 3 years ago)
- Last Synced: 2025-04-12T13:13:33.481Z (16 days ago)
- Language: Python
- Homepage:
- Size: 13.7 KB
- Stars: 6
- Watchers: 2
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# shellinject.py
Spawn a reverse TCP in the context of another linux processLargely based on [dlinject](https://github.com/DavidBuchanan314/dlinject/), but
with different stage2 shellcode. (Perhaps I should merge these codebases and/or
create a generic shellcode injection library?).I created this so I could quickly and conclusively answer questions like "does
process x have permission to access resource y".### TODO:
- Add support for other architectures (notably ARM).
- Don't rely on netcat for our reverse shell - we should just open a socket
in the stage2 shellcode.