Explore >> Select a destination


You are here

wsummerhill.github.io
| | 0xboku.com
1.8 parsecs away

Travel
| | [AI summary] This blog post discusses the process of modifying a TCP reverse shell shellcode to remove null characters, enabling its injection into host programs, and demonstrates its successful execution.
| | cocomelonc.github.io
1.7 parsecs away

Travel
| | [AI summary] The article explains how to create a reverse shell on macOS using assembly code targeting Intel x86_64 architecture. It walks through each step of the process, from creating a socket connection to establishing a connection with the attacker's machine, duplicating file descriptors, and executing a shell. It also provides examples in C and ARM architecture, highlighting the importance of understanding such techniques for both attackers and defenders.
| | modexp.wordpress.com
2.6 parsecs away

Travel
| | Introduction Just a quick post about some shellcodes for a raspberry pi 3 I purchased recently to learn ARM assembly. For those interested in developing your own, you can find a full list of Linux system calls in Thumb mode here These examples are only intended for 32-bit Linux. BSD or other OS that run...
| | idafchev.github.io
20.0 parsecs away

Travel
| A second look at the arcane art of shellcode writing