Rename leftovers to the new name InjectionForge

Signed-off-by: Dimitris Zervas <dzervas@dzervas.gr>
This commit is contained in:
Dimitris Zervas 2024-04-15 21:53:28 +03:00
parent ff5a7f152f
commit 936080b4e8
No known key found for this signature in database
7 changed files with 32 additions and 32 deletions

View File

@ -1,2 +1,2 @@
[env]
FRIDA_CODE = "console.log('Hello World from frida-deepfreeze-rs!')"
FRIDA_CODE = "console.log('Hello World from InjectionForge!')"

36
Cargo.lock generated
View File

@ -224,24 +224,6 @@ dependencies = [
"xz",
]
[[package]]
name = "frida-deepfreeze-rs"
version = "0.1.0"
dependencies = [
"build-target",
"ctor",
"frida",
"goblin",
"lazy_static",
"mylib",
"pretty_assertions",
"serde",
"serde_json",
"toml",
"winapi",
"windows-sys 0.52.0",
]
[[package]]
name = "frida-sys"
version = "0.13.6"
@ -473,6 +455,24 @@ dependencies = [
"hashbrown",
]
[[package]]
name = "injectionforge"
version = "0.1.0"
dependencies = [
"build-target",
"ctor",
"frida",
"goblin",
"lazy_static",
"mylib",
"pretty_assertions",
"serde",
"serde_json",
"toml",
"winapi",
"windows-sys 0.52.0",
]
[[package]]
name = "ipnet"
version = "2.9.0"

View File

@ -1,5 +1,5 @@
[package]
name = "frida-deepfreeze-rs"
name = "injectionforge"
version = "0.1.0"
edition = "2021"

View File

@ -1,11 +1,11 @@
# frida-deepfreeze-rs
# InjectionForge
<img align="right" height="300" src=".github/logo.png" alt="frida-deepfreeze-rs logo" />
<img align="right" height="300" src=".github/logo.png" alt="InjectionForge logo" />
Have you ever written a frida script this good, that you wanted to make it permanent?
Well, now you can!
frida-deepfreeze-rs is a tool that allows you to convert your frida scripts into
InjectionForge is a tool that allows you to convert your frida scripts into
either a standalone executable that when called with a PID injects itself and runs
the script or a shared library that can be somehow injected to a process and runs
the script.
@ -31,8 +31,8 @@ The standalone executable is the easiest to use. You just run it with a PID and
it will inject itself and run the frida script.
```bash
git clone https://github.com/dzervas/frida-deepfreeze-rs
FRIDA_CODE='console.log("Hello world from frida-deepfreeze-rs!")' cargo run --bin standalone -- 1234
git clone https://github.com/dzervas/injectionforge
FRIDA_CODE='console.log("Hello world from InjectionForge!")' cargo run --bin standalone -- 1234
```
The binary is located at `target/debug/standalone` (`.exe` for windows).
@ -43,8 +43,8 @@ The shared library is a bit more complicated to use. You have to inject it to
a process using a tool like `LD_PRELOAD` (linux) or `rundll32.exe` (windows).
```bash
git clone https://github.com/dzervas/frida-deepfreeze-rs
FRIDA_CODE='console.log("Hello world from frida-deepfreeze-rs!")' cargo build --lib
git clone https://github.com/dzervas/injectionforge
FRIDA_CODE='console.log("Hello world from InjectionForge!")' cargo build --lib
LD_PRELOAD=target/debug/libfrida_deepfreeze_rs.so cat
# rundll32.exe target/debug/frida_deepfreeze_rs.dll,inject_self 1234 (windows equivalent)
```
@ -77,6 +77,6 @@ run any extra commands.
**NOTE**: This only works on Windows (for now?).
```bash
git clone https://github.com/dzervas/frida-deepfreeze-rs
DLL_PROXY='../myawesome.dll' FRIDA_CODE='console.log("Hello world from frida-deepfreeze-rs!")' cargo xwin build --lib --target x86_64-pc-windows-msvc
git clone https://github.com/dzervas/injectionforge
DLL_PROXY='../myawesome.dll' FRIDA_CODE='console.log("Hello world from InjectionForge!")' cargo xwin build --lib --target x86_64-pc-windows-msvc
```

View File

@ -4,6 +4,6 @@ use crate::injector::attach_self;
#[ctor]
fn _start() {
println!("[+] frida-deepfreeze-rs library injected");
println!("[+] InjectionForge library injected");
attach_self();
}

View File

@ -10,7 +10,7 @@ use winapi::um::libloaderapi::LoadLibraryA;
pub extern "system" fn DllMain(dll_module: *mut c_void, call_reason: u32, _: *mut ()) -> bool {
match call_reason {
DLL_PROCESS_ATTACH => {
println!("[+] frida-deepfreeze-rs DLL injected");
println!("[+] InjectionForge DLL injected");
if let Some(lib_name) = option_env!("LIB_NAME") {
unsafe { LoadLibraryA(lib_name.as_ptr() as *const i8); }

View File

@ -9,7 +9,7 @@ use winapi::um::winnt::{EVENT_TRACE_CONTROL_STOP, EVENT_TRACE_FLAG_PROCESS};
pub fn start_daemon() {
// Create an event trace session
let session_name = "frida-deepfreeze-rs";
let session_name = "InjectionForge";
let session_handle = create_event_trace_session(session_name);
if session_handle.is_null() {
eprintln!("Failed to create event trace session");