Saruman v0.1
A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

Saruman v0.1
A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.
Saruman v0.1 Description
Saruman v0.1 is a proof-of-concept executable injection tool that allows users to compile and launch parasitic executables within target processes. The tool includes a launcher that can be compiled using make, which also attempts to compile a user-supplied parasite.c file. The parasite executable must be compiled with specific flags (-fpic -pie) to ensure proper functionality. The current version has limitations as it does not support injecting programs that require command line arguments, being an early proof-of-concept implementation. The tool offers two injection methods: a standard approach and a more stealth technique using the --no-dlopen flag with the parasite executable. The stealth loading feature currently contains bugs and may not function properly with complex parasites, indicating areas for future development and improvement.
Saruman v0.1 FAQ
Common questions about Saruman v0.1 including features, pricing, alternatives, and user reviews.
Saruman v0.1 is A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.. It is a Security Operations solution designed to help security teams with Evasion, Proof Of Concept, Dll Injection.
ALTERNATIVES
Red team toolkit for EDR evasion, initial access, and post-exploitation.
TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.
A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.
A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.
EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox