Type make to compile launcher (It will also try to compile a parasite.c file which is for you to supply). Make sure your parasite executable is compiled with -fpic -pie. In this version, Saruman doesn't yet support injecting a program that requires command line args because it is early POC. So <parasite_args> will not actually accept args yet. To run with a more stealth technique of loading the executable, use: ./launcher --no-dlopen <parasite_executable>. Currently, this feature has some bugs and won't work with more complex parasites (To be fixed).
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Code to prevent a managed .NET debugger/profiler from working.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.