Crates.io | pox |
lib.rs | pox |
version | 0.2.0 |
source | src |
created_at | 2024-03-16 05:29:33.233682 |
updated_at | 2024-03-16 05:29:33.233682 |
description | infection framework for processes |
homepage | |
repository | https://git.alemi.dev/pox.git/ |
max_upload_size | |
id | 1175433 |
size | 47,426 |
Pox is an infection framework for processes, with tools to manipulate the remote address space.
Pox is built with the PTRACE syscall, so its limited to Linux/BSD systems.
Pox itself is a crate providing features to execute remote syscalls, inject remote strings, monitor remote execution and find memory mappings.
Most features can be individually selected while including this crate in your project: [locator, monitor, rc]
.
Additionally, with the bin
feature, a sample infection binary will be produced: vector
.
Vector can infect running processes, invoking dlopen()
remotely and loading a shared object.
It will only work on binaries with glibc linked (no musl support yet).
It can both attack a running process (probably will require root privileges) or spawn a child process and infect it.
Vector will:
Pox is still under development. I'm building this to explore Linux OS, processes and memory.
This could potentially be used to produce malware, since it helps introduce extraneous libraries into running processes. However, I believe it's still fine to opensource this: