CIP Cyber

peinjector – MITM PE file infector

Table of Contents

The executable file format on the Windows platform is PE COFF. The peinjector provides different ways to infect these files with custom payloads without changing the original functionality. It creates patches, which are then applied seamlessly during file transfer. It is very performant, lightweight, modular and can be operated on embedded hardware.

Features

  • Full x86 and x64 PE file support.
  • Open Source
  • Fully working on Windows and Linux, including automated installation scripts.
  • Can be operated on embedded hardware, tested on a Rasperberry Pi 2.
  • On Linux, all servers will be automatically integrated as service, no manual configuration required.
  • Plain C, no external libraries required (peinjector).
  • MITM integration is available in C, Python and Java. A sample Python MITM implementation is included.
  • Foolproof, mobile-ready web interface. Anyone who can configure a home router can configure the injector server.
  • Easy to use integrated shellcode factory, including reverse
    shells, meterpreter, … or own shellcode. Everything is available in 32
    and 64 bit with optional automated encryption. Custom shellcode can be
    injected directly or as a new thread.
  • An awesome about page and much more, check it out.

 

peinjector

                                  + configuration
                                  | payload
                                  | ...
                      +-----------v------------+
      +-------+       |                        |
      | PATCH <-------+      libpeinfect       <--+
      +-------+       |                        |  |
                      +-----------+------------+  |
                                  |               |
                      +-----------v------------+  |
                      |                        |  |
      +--------------->       libpetool        |  |
      | change values |                        |  |
      | add sections  +-----------^------------+  |
      | resize sect.              |               |
      + ...                  +----v----+          |
                             | PEFILE  +----------+
                             +----^----+
                                  |
                      +-----------v------------+
      PE File data    |                        |    PE File data
      +--------------->       libpefile        +--------------->
                      |                        |
                      +------------------------+ 
 
 
 
 
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Sunset: Dusk VM walkthrough

Sunset: dusk is a vulnerable by design Debian based machine created by whitecrOwz. It is available on https://www.vulnhub.com This machine is ranked as a beginner

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings