v0.7.0
- Add
sh4d0wup front
command to spawn a zero-config reverse proxy. This is useful for reverse engineering or if you quickly want to test something without starting a plot first. - Add
sh4d0wup infect elf-fwd-stdin
command to generate elf binaries that spawn a subprocess and then forward some data that gets embedded at a build time. This can be used to execute shell or python scripts without writing them to disk. - Re-introduce the shell script patching code as
sh4d0wup infect sh
. It allows to hook functions. Shell parsing is provided by yash-syntax which is experimental. Only shorthand functions likefoo() { echo hello world; }
are supported but notfunction foo() { echo hello world; }
. This feature is available over the cli, in plot files for artifacts and to transform http responses. - Git commit bruteforce was refactored from normal threads to tokio.
- Improve compatibility with http2 and non-root container images. It's now possible to easily match the host/authority of a request (this feature is sometimes refered to as
vhosts
). - Allow more complex elf payload configurations, see
contrib/plot-elf-galore.yaml
Thanks
We'd like to thank @SantiagoTorres, @repi and @rgacogne for their support on github sponsors.