I recently pushed an update to Sickle that generates shellcode to perform reflective ELF loading.<p>If you're unfamiliar with what exactly this is, to give you a quick high-level overview; an attacker uses these techniques to map an executable filetype (EXE, ELF) into memory and execute it. When done correctly this prevents the malware from ever touching disk!<p>If you want to see a demo run of it launching a “Hello World” application, I uploaded a video on X.<p><a href="https://x.com/wetw0rk_bot/status/1867739765610811665" rel="nofollow">https://x.com/wetw0rk_bot/status/1867739765610811665</a>