Saruman v0.1 Logo

Saruman v0.1

A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

138
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Saruman v0.1 Description

Saruman v0.1 is a proof-of-concept executable injection tool that allows users to compile and launch parasitic executables within target processes. The tool includes a launcher that can be compiled using make, which also attempts to compile a user-supplied parasite.c file. The parasite executable must be compiled with specific flags (-fpic -pie) to ensure proper functionality. The current version has limitations as it does not support injecting programs that require command line arguments, being an early proof-of-concept implementation. The tool offers two injection methods: a standard approach and a more stealth technique using the --no-dlopen flag with the parasite executable. The stealth loading feature currently contains bugs and may not function properly with complex parasites, indicating areas for future development and improvement.

Saruman v0.1 FAQ

Common questions about Saruman v0.1 including features, pricing, alternatives, and user reviews.

Saruman v0.1 is A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.. It is a Security Operations solution designed to help security teams with Evasion, Proof Of Concept, Dll Injection.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Core Security Outflank Security Tooling Logo

Red team toolkit for EDR evasion, initial access, and post-exploitation.

0
TikiTorch Logo

TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.

0
Donut Logo

A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.

0
WebDAV Covert Channel Logo

A covert channel technique that uses WebDAV protocol features to deliver malicious payloads and establish C2 communication while bypassing security controls.

0
EvilClippy Logo

EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox