Loading...
A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.
Saruman v0.1 is a proof-of-concept executable injection tool that allows users to compile and launch parasitic executables within target processes. The tool includes a launcher that can be compiled using make, which also attempts to compile a user-supplied parasite.c file. The parasite executable must be compiled with specific flags (-fpic -pie) to ensure proper functionality. The current version has limitations as it does not support injecting programs that require command line arguments, being an early proof-of-concept implementation. The tool offers two injection methods: a standard approach and a more stealth technique using the --no-dlopen flag with the parasite executable. The stealth loading feature currently contains bugs and may not function properly with complex parasites, indicating areas for future development and improvement.
Common questions about Saruman v0.1 including features, pricing, alternatives, and user reviews.
Saruman v0.1 is A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.. It is a Security Operations solution designed to help security teams with Payload, Offensive Security, Ethical Hacking.
Get strategic cybersecurity insights in your inbox