This project is based on Famine, which consisted of creating code that injected itself into other system's binaries.
Pestilence aims to add protections to Famine, disabling its malicious behavior in certain cases:
- If a debugger is present (i used ptrace)
- If a certain process is running on the machine (i chose htop)
And if the payload is modified for debugging purposes, the payload must be corrupted.
Pedagogical Objective: Learn about binary manipulation, ELF format, injection techniques, and their implications on system security. The project provides an opportunity to explore code injection, memory manipulation.
Pestilence is intended solely for educational purposes and must be treated responsibly.
Code injection and persistence mechanisms can be misused for malicious purposes, which is why this project must not be used on any machine without permission.
The goal is to learn about these techniques, not to implement them in production environments or real-world systems.