Saruman v0.1 Logo

Saruman v0.1

0
Free
Visit Website

Type make to compile launcher (It will also try to compile a parasite.c file which is for you to supply). Make sure your parasite executable is compiled with -fpic -pie. In this version, Saruman doesn't yet support injecting a program that requires command line args because it is early POC. So <parasite_args> will not actually accept args yet. To run with a more stealth technique of loading the executable, use: ./launcher --no-dlopen <parasite_executable>. Currently, this feature has some bugs and won't work with more complex parasites (To be fixed).

FEATURES

ALTERNATIVES

A collection of YARA rules for public use, built from intelligence profiles and file work.

Scans running processes for potentially malicious implants and dumps them.

A freeware suite of tools for PE editing and process viewing, including CFF Explorer and Resource Editor.

Hyara is a plugin that simplifies writing YARA rules with various convenient features.

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

A tool for translating Dalvik bytecode to equivalent Java bytecode, allowing Java analysis tools to analyze Android applications.

Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.

Generate Yara rules from function basic blocks in x64dbg.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved