Our great sponsors
-
ulexecve
ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teaming and anti-forensics purposes.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
Definitely tricky. I solved it with a Python implementation by building up a big jumpbuffer so that the moment I leave Python-land I copy from temporary buffers to the right addresses and then ultimately jump at the entry point of the newly loaded binary. It's tricky and took quite some debugging to get right, but it's proven rather solid now.
See https://github.com/anvilsecure/ulexecve/blob/main/ulexecve.p... for details. Especially the `CodeGenerator` classes with implementations in x86, x86-64 and aarch64.
If anyone's looking for an example, I used this trick a few months ago to embed a tiny helper binary [0] directly into my application [1] so I wouldn't have to ship two executables or add "hidden" behavior to the main program. It works really well (on Linux)!
[0]: https://github.com/impl/systemd-user-sleep/blob/666cf29871b1...
Related posts
- An anonymous SMS sending tool with a WebGUI
- An anonymous SMS sending tool with a WebGUI
- Encrypt / Decrypt files / folders to simulate ransomware
- GitHub - iomoath/SharpStrike: A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
- SharpStrike: A Post exploitation tool written in C# uses either CIM or WMI to query remote systems