|
You are here |
wsummerhill.github.io | ||
| | | | |
0xboku.com
|
|
| | | | | [AI summary] This blog post discusses the process of modifying a TCP reverse shell shellcode to remove null characters, enabling its injection into host programs, and demonstrates its successful execution. | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] The article explains how to create a reverse shell on macOS using assembly code targeting Intel x86_64 architecture. It walks through each step of the process, from creating a socket connection to establishing a connection with the attacker's machine, duplicating file descriptors, and executing a shell. It also provides examples in C and ARM architecture, highlighting the importance of understanding such techniques for both attackers and defenders. | |
| | | | |
modexp.wordpress.com
|
|
| | | | | Introduction Just a quick post about some shellcodes for a raspberry pi 3 I purchased recently to learn ARM assembly. For those interested in developing your own, you can find a full list of Linux system calls in Thumb mode here These examples are only intended for 32-bit Linux. BSD or other OS that run... | |
| | | | |
idafchev.github.io
|
|
| | | A second look at the arcane art of shellcode writing | ||