quasar
quasar copied to clipboard
quASAR: ASAR manipulation made easy
quASAR

quASAR: ASAR manipulation made easy
This project is a proof-of-concept for manipulating ASAR files for code injection in Electron apps.
This capability works across all platforms, and compiled binaries are available on the releases page.
Usage
quasar [options]
Options:
-i, --input <inputFile> asar file to mutate (default: "app.asar")
-c, --command <command> command to insert (default: "calc.exe")
-w --write write evil files directly to application dir
-h, --help display help for command
quasar requires a .asar file as a target. It can either be located elsewhere on the filesystem or, as is default, an app.asar file local to the current directory.
You will be presented with a list of injectable .js files in the archive. Select one by number, and the command provided by -c will be injected.
Without -w, the resulting app.asar and app.asar.unpacked will be created in a new evil directory within the current directory. However, if -w is provided, the ASAR files will be written back to the original path, and the original files will have .bak appended to their filenames.