TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reflectively Loading ELFs, may we never touch Disk

2 pointsby wetw0rk5 months ago

1 comment

wetw0rk5 months ago
I recently pushed an update to Sickle that generates shellcode to perform reflective ELF loading.<p>If you&#x27;re unfamiliar with what exactly this is, to give you a quick high-level overview; an attacker uses these techniques to map an executable filetype (EXE, ELF) into memory and execute it. When done correctly this prevents the malware from ever touching disk!<p>If you want to see a demo run of it launching a “Hello World” application, I uploaded a video on X.<p><a href="https:&#x2F;&#x2F;x.com&#x2F;wetw0rk_bot&#x2F;status&#x2F;1867739765610811665" rel="nofollow">https:&#x2F;&#x2F;x.com&#x2F;wetw0rk_bot&#x2F;status&#x2F;1867739765610811665</a>