task_vaccine Logo

task_vaccine

Code injection library for OS X with cross-architecture support.

54
Visit website
1
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

task_vaccine Description

Yet another code injection library for OS X. $ git clone --recursive https://github.com/rodionovd/task_vaccine.git task_vaccine $ cd ./task_vaccine $ rake test $ rake build # will build an x86_64 dynamic library and place it into ./build/x86_64 #include "task_vaccine.h" task_t target = ...; int err = task_vaccine(target, "./payload0.dylib"); if (err != KERN_SUCCESS) { fprintf(stderr, "task_vaccine() failed with error: %d\n", err); } see Usage for details. Why should I use this thing instead of mach_inject? Well, for a couple of reasons actually: mach_inject's codebase is old and it hasn't been updated for a while. You can not inject i386 targets from x86_64 hosts and vice versa using mach_inject, so you should use two different injectors. With task_vaccine you can actually do it. I have automated tests 🚦 How it works: Pretty straightforward, see: At first, we create a new thread inside a target task (process) and execute _pthread_set_self() function on it. We can only create a raw Mach thread inside a target task. But many functions (such as dlopen()) rely on pthread stuff (locks, etc), so we have to initialize a pthread first and only then execute dlopen() for lo

task_vaccine FAQ

Common questions about task_vaccine including features, pricing, alternatives, and user reviews.

task_vaccine is Code injection library for OS X with cross-architecture support.. It is a Security Operations solution designed to help security teams with Osx, Code Injection.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Dendrobate Logo

A managed code hooking template for .NET assemblies, enabling API hooking, code injection, and runtime manipulation.

0
Donut Logo

A shellcode generator that creates position-independent code for loading and executing .NET Assemblies, PE files, and Windows payloads from memory.

0
GadgetToJScript Logo

A tool that generates .NET serialized gadgets for triggering assembly load and execution through BinaryFormatter deserialization in JavaScript, VBScript, and VBA scripts.

0
TikiTorch Logo

TikiTorch is a process injection tool that executes code within the address space of other processes using various injection techniques.

0
PowerSploit Logo

PowerSploit is a PowerShell-based penetration testing framework containing modules for code execution, injection techniques, persistence, and various offensive security operations.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox