Linux shellcode code memory injection library .so .dll injection without ptrace example PoC [x86_64, ARM!] (own development)
make
make BUILD=common
./hello
./mem_inject $(pidof hello) modules/injected_library.so
./mem_inject $(pidof hello) modules/reg_info.so
./mem_inject.py $(pidof hello)
change the file src/shellcode.h or src/shellcode.py as example RET only instruction
echo "unsigned const char shellcode[] = {0xc3};" > src/shellcode.h
make
create your own library with _start function as entry_point
nano modules/my_own_lib.c
make
./mem_inject $(pidof hello) modules/my_own_lib.so