diff --git a/.cargo/config.toml b/.cargo/config.toml
index d4ed03a..c498b2c 100644
--- a/.cargo/config.toml
+++ b/.cargo/config.toml
@@ -1,2 +1,2 @@
[env]
-FRIDA_CODE = "console.log('Hello World from frida-deepfreeze-rs!')"
+FRIDA_CODE = "console.log('Hello World from InjectionForge!')"
diff --git a/Cargo.lock b/Cargo.lock
index f6e792e..1fda6b7 100644
--- a/Cargo.lock
+++ b/Cargo.lock
@@ -224,24 +224,6 @@ dependencies = [
"xz",
]
-[[package]]
-name = "frida-deepfreeze-rs"
-version = "0.1.0"
-dependencies = [
- "build-target",
- "ctor",
- "frida",
- "goblin",
- "lazy_static",
- "mylib",
- "pretty_assertions",
- "serde",
- "serde_json",
- "toml",
- "winapi",
- "windows-sys 0.52.0",
-]
-
[[package]]
name = "frida-sys"
version = "0.13.6"
@@ -473,6 +455,24 @@ dependencies = [
"hashbrown",
]
+[[package]]
+name = "injectionforge"
+version = "0.1.0"
+dependencies = [
+ "build-target",
+ "ctor",
+ "frida",
+ "goblin",
+ "lazy_static",
+ "mylib",
+ "pretty_assertions",
+ "serde",
+ "serde_json",
+ "toml",
+ "winapi",
+ "windows-sys 0.52.0",
+]
+
[[package]]
name = "ipnet"
version = "2.9.0"
diff --git a/Cargo.toml b/Cargo.toml
index 838f38f..8fef6ac 100644
--- a/Cargo.toml
+++ b/Cargo.toml
@@ -1,5 +1,5 @@
[package]
-name = "frida-deepfreeze-rs"
+name = "injectionforge"
version = "0.1.0"
edition = "2021"
diff --git a/README.md b/README.md
index 67ab9f0..b848f9a 100644
--- a/README.md
+++ b/README.md
@@ -1,11 +1,11 @@
-# frida-deepfreeze-rs
+# InjectionForge
-
+
Have you ever written a frida script this good, that you wanted to make it permanent?
Well, now you can!
-frida-deepfreeze-rs is a tool that allows you to convert your frida scripts into
+InjectionForge is a tool that allows you to convert your frida scripts into
either a standalone executable that when called with a PID injects itself and runs
the script or a shared library that can be somehow injected to a process and runs
the script.
@@ -31,8 +31,8 @@ The standalone executable is the easiest to use. You just run it with a PID and
it will inject itself and run the frida script.
```bash
-git clone https://github.com/dzervas/frida-deepfreeze-rs
-FRIDA_CODE='console.log("Hello world from frida-deepfreeze-rs!")' cargo run --bin standalone -- 1234
+git clone https://github.com/dzervas/injectionforge
+FRIDA_CODE='console.log("Hello world from InjectionForge!")' cargo run --bin standalone -- 1234
```
The binary is located at `target/debug/standalone` (`.exe` for windows).
@@ -43,8 +43,8 @@ The shared library is a bit more complicated to use. You have to inject it to
a process using a tool like `LD_PRELOAD` (linux) or `rundll32.exe` (windows).
```bash
-git clone https://github.com/dzervas/frida-deepfreeze-rs
-FRIDA_CODE='console.log("Hello world from frida-deepfreeze-rs!")' cargo build --lib
+git clone https://github.com/dzervas/injectionforge
+FRIDA_CODE='console.log("Hello world from InjectionForge!")' cargo build --lib
LD_PRELOAD=target/debug/libfrida_deepfreeze_rs.so cat
# rundll32.exe target/debug/frida_deepfreeze_rs.dll,inject_self 1234 (windows equivalent)
```
@@ -77,6 +77,6 @@ run any extra commands.
**NOTE**: This only works on Windows (for now?).
```bash
-git clone https://github.com/dzervas/frida-deepfreeze-rs
-DLL_PROXY='../myawesome.dll' FRIDA_CODE='console.log("Hello world from frida-deepfreeze-rs!")' cargo xwin build --lib --target x86_64-pc-windows-msvc
+git clone https://github.com/dzervas/injectionforge
+DLL_PROXY='../myawesome.dll' FRIDA_CODE='console.log("Hello world from InjectionForge!")' cargo xwin build --lib --target x86_64-pc-windows-msvc
```
diff --git a/src/loader_unix.rs b/src/loader_unix.rs
index ad04610..4f50ffc 100644
--- a/src/loader_unix.rs
+++ b/src/loader_unix.rs
@@ -4,6 +4,6 @@ use crate::injector::attach_self;
#[ctor]
fn _start() {
- println!("[+] frida-deepfreeze-rs library injected");
+ println!("[+] InjectionForge library injected");
attach_self();
}
diff --git a/src/loader_windows.rs b/src/loader_windows.rs
index 3c55b90..ff8d1ce 100644
--- a/src/loader_windows.rs
+++ b/src/loader_windows.rs
@@ -10,7 +10,7 @@ use winapi::um::libloaderapi::LoadLibraryA;
pub extern "system" fn DllMain(dll_module: *mut c_void, call_reason: u32, _: *mut ()) -> bool {
match call_reason {
DLL_PROCESS_ATTACH => {
- println!("[+] frida-deepfreeze-rs DLL injected");
+ println!("[+] InjectionForge DLL injected");
if let Some(lib_name) = option_env!("LIB_NAME") {
unsafe { LoadLibraryA(lib_name.as_ptr() as *const i8); }
diff --git a/src/win_daemon.rs b/src/win_daemon.rs
index 7175dd7..41e7afb 100644
--- a/src/win_daemon.rs
+++ b/src/win_daemon.rs
@@ -9,7 +9,7 @@ use winapi::um::winnt::{EVENT_TRACE_CONTROL_STOP, EVENT_TRACE_FLAG_PROCESS};
pub fn start_daemon() {
// Create an event trace session
- let session_name = "frida-deepfreeze-rs";
+ let session_name = "InjectionForge";
let session_handle = create_event_trace_session(session_name);
if session_handle.is_null() {
eprintln!("Failed to create event trace session");