Inject code into a running Python process
Project description
Pyrasite lets you to inject arbitrary code into an unaltered running Python process.
It also contains a graphical interface that makes it easy to monitor and introspect running processes.
Requirements
gdb (https://www.gnu.org/s/gdb) (version 7.3+)
python-gobject-dev (on debian or ubuntu: apt-get install python-gobject-dev)
Cython (http://cython.org)
meliae (https://launchpad.net/meliae) - easy_install/pip may not work for this install. If not, use the tarball from the distribution website
Download
Download the latest stable release from PyPi: http://pypi.python.org/pypi/pyrasite
easy_install pyrasite
Grab the latest source by running:
git clone git://git.fedorahosted.org/git/pyrasite
You can also fork pyrasite on GitHub: http://github.com/lmacken/pyrasite
pyrasite-gui
API
from pyrasite.inject import CodeInjector ci = CodeInjector(p.pid) ci.inject('payloads/helloworld.py')
Payloads
Reverse Python Shell
This lets you easily introspect or alter any objects in your running process.
$ python >>> x = 'foo'
$ pyrasite <PID> payloads/reverse_python_shell.py $ nc -l localhost 9001 Python 2.7.1 (r271:86832, Apr 12 2011, 16:15:16) [GCC 4.6.0 20110331 (Red Hat 4.6.0-2)] Type 'quit' to exit. >>> print x foo >>> globals()['x'] = 'bar'
Viewing the largest objects in your process
This payload uses meliae to dump all of the objects in your process to an objects.json file (currently dumped in the working directory of your process).
$ pyrasite <PID> payloads/dump_memory.py
Pyrasite also provides a tool to view the values of largest objects in your process.
$ pyrasite-memory-viewer <PID> objects.json
Reverse Shell
$ pyrasite <PID> payloads/reverse_shell.py $ nc -l localhost 9001 Linux tomservo 2.6.40.3-0.fc15.x86_64 #1 SMP Tue Aug 16 04:10:59 UTC 2011 x86_64 x86_64 x86_64 GNU/Linux Type 'quit' to exit. % ls
Call Graph
Pyrasite comes with a payload that generates an image of your processes call graph using pycallgraph.
$ pyrasite <PID> payloads/start_callgraph.py $ pyrasite <PID> payloads/stop_callgraph.py
The callgraph is then generated using graphviz and saved to callgraph.png. You can see an example callgraph here.
Dumping modules, thread stacks, and forcing garbage collection
payloads/dump_modules.py payloads/dump_stacks.py payloads/force_garbage_collection.py
Additional installation notes
Mac OS X
If you don’t want to override Apple’s default gdb, install the latest version of gdb with a prefix (e.g. gnu)
$ ./configure --program-prefix=gnu $ pyrasite <PID> payloads/reverse_python_shell.py --prefix="gnu"
Ubuntu
Since version 10.10, Ubuntu ships with a controversial patch that restricts the scope of ptrace, which can be disabled by running:
echo 0 | sudo tee /proc/sys/kernel/yama/ptrace_scope
Mailing List
IRC
#pyrasite on Freenode.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
File details
Details for the file pyrasite-2.0beta2.tar.gz
.
File metadata
- Download URL: pyrasite-2.0beta2.tar.gz
- Upload date:
- Size: 74.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | db171537b2121f0f97f0959b03cd6cd332c3f0ea0ba4d4675b9a0921b9975e32 |
|
MD5 | 439efe60c3a28b63e0f6af9e7f304f7a |
|
BLAKE2b-256 | 8daa390d809ded165276ba1092296bf4a988107bcd23ba9325c0d31358b26a69 |