A powerful Reverse Engineering & Red Teaming framework designed to inject arbitrary code into running Python processes.
It specifically targets compiled Python applications (Nuitka, PyInstaller, cx_Freeze) where the source code is hidden. The tool injects a DLL payload, initializes the Python API within the victim process, and grants full control over the runtime environment.
⚠️ DISCLAIMER: This tool is for educational purposes and authorized security testing only. The author is not responsible for any misuse.
The framework includes 9 distinct payloads for different phases of analysis:
- Full Dumper: Extracts all global variables from
__main__. Useful for dumping hidden configs and database credentials loaded in memory. - Universal Inspector: Reflective scanner that discovers all custom classes in the target process. Lists methods
[M]and attributes[V]dynamically. - Signature Fuzzer: Brute-forces method calls with empty arguments to trigger
TypeErrorexceptions, leaking the exact function signature (argument names/types). - Payday (ACE): Arbitrary Code Execution. A template to inject and execute your own custom Python logic inside the target context.
- Anti-Anti-Debug: Patches
IsDebuggerPresentin memory usingctypes, allowing you to attach debuggers (x64dbg, Cheat Engine) to protected processes. - Deep Memory Scan: Triggers the Garbage Collector to iterate over the Heap. Searches for secrets (strings/bytes) like
password,auth,tokendeep inside objects. - MITM Hook: Installs a Python decorator on target functions to intercept arguments, modify return values, and log traffic in real-time.
- HTTP Spy: Hooks
requests.Session.requestto capture traffic before HTTPS encryption. Bypasses SSL Pinning and certificate checks. - Environment Dump: Extracts
os.environvariables to find Cloud Keys (AWS, Google), Connection Strings, and hidden flags.
-
Clone the repository:
git clone https://github.com/crackalove/nuitka-injector cd nuitka-injector -
Install dependencies:
pip install -r requirements.txt
Note: You must run this tool as Administrator to acquire SeDebugPrivilege for memory injection.
- Run the injector:
python injector.py -
Select the Target PID from the list of detected Python processes. The tool automatically detects architecture (x86/x64) and Python version.
-
Choose a Payload Mode (1-9) from the menu.
-
Check the output logs generated in the %TEMP% directory (or the script folder). Select the Target PID from the list of detected Python processes.
Modes 3 (Fuzzer), 4 (Payday), and 7 (MITM) act as templates. To target a specific logic in a specific application, you need to edit the injector.py file.
Look for the configuration blocks inside the payload strings:
TARGET_CLASS_NAME = "PaymentProcessor" and TARGET_METHOD_NAME = "process_transaction"
Inspector, Deep Scan, HTTP Spy, and Dumpers are fully automatic and require no configuration.
Python 3: Core logic.
Pymem: For reading/writing process memory and allocating shellcode.
Pefile: For static analysis of DLL exports (Cross-Arch resolution).
Native WinAPI: Direct usage of GetNativeSystemInfo, OpenProcess, and CreateRemoteThread.
Rich: For the professional CLI interface.
This project is licensed under the MIT License - see the LICENSE file for details.