Invade is a Python 3 library for interacting with Windows processes. Common uses: software security and malware research, reverse engineering, and PoCs.
There are four classes in main.py:
- Me: for operating environment info
- Scout: for process discovery
- Target: for target process info
- Tool: for main operation
Common use case overview:
- Create an instance of Me and check the operating environment for compatibility.
- Use Scout to get a list of active processes and the desired PID (process identifier).
- Instantiate Target using the PID obtained by Scout.
- Check Target instance properties for information about the target process.
- Interact with the target process using Tool methods.
Another common use case is Invade's relatively fast byte pattern search with wildcard support. Operation is similar to IDA's "sequence of bytes" search. Use Tool.search_file_pattern() to search through a file on disk.
Tool.memory_read_pointers() is also useful. With it, you can read through a series of dynamically allocated memory pointers in another process. The method accepts a string containing a start address and relative pointers with common arithmetic operators.
Refer to main.py for additional information and usage instructions.
Refer to RELEASE.md for release notes.
Python 3.6+ is required
pip install invade
Install Keystone for Python. See Python module for Windows - Binaries.
Install Capstone for Python. See Python module for Windows - Binaries.
- main.py: contains all main code and classes
- winapi.py: contains Windows API code
- version.py: contains version information
- invade_debug_32: Windows x86 32-bit non-attaching debug tool
- invade_keepass: KeePass password exfiltration
Chad Gosselin (https://github.com/cgio)
Thank you to the following projects:
- Keystone: assembler framework
- Capstone: disassembler framework
- Cuckoo Sandbox: malware analysis framework
- pefile: PE file framework
This project is licensed under the MIT License. See LICENSE.md for details. This project is for educational purposes only. Use at your own risk.