Tool for C-code injections in already compiled bins


Keywords
dynamic-analysis, hooking, hooking-framework, injection, reverse-engineering
License
MIT
Install
pip install shooker==1.2.3

Documentation

Shooker

Tool for C-code injections in already compiled bins.

Usage

Write hook config as described in the instruction.

shooker --xml config.xml target_dir/ output_dir/

Install

pip install shooker
Please read about common errors

Tests

Follow the instruction to check the functionality

git clone https://github.com/ReKreker/shooker
cd shooker/tests
cmake -S. -Bbuild
pushd build
make
make test
popd

To improve

  • Add ability to inject to .exe/.dll
  • Try to avoid sub-instruction patching mechanism in the hook(s)
  • Add support of arm architecture
  • Add support hooking raw binaries
  • Develop true hook(not replace)
  • Plug in IDA/Ghidra