UW_sp_mmapinject
New release: UW_sp_mmapinject, an other syscall proxy client for code injection into a process. This one use a mmap shellcode to provide memory space for the parasite. It use a signal + alarm code for running each 30sec the parasite. The interest is you cant infect staticaly linked process and you dont care about the size of your parasite code. NB: this code must be compiled with UWsplib which is not public atm.