TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Reflectively Loading ELFs, may we never touch Disk

2 点作者 wetw0rk5 个月前

1 comment

wetw0rk5 个月前
I recently pushed an update to Sickle that generates shellcode to perform reflective ELF loading.<p>If you&#x27;re unfamiliar with what exactly this is, to give you a quick high-level overview; an attacker uses these techniques to map an executable filetype (EXE, ELF) into memory and execute it. When done correctly this prevents the malware from ever touching disk!<p>If you want to see a demo run of it launching a “Hello World” application, I uploaded a video on X.<p><a href="https:&#x2F;&#x2F;x.com&#x2F;wetw0rk_bot&#x2F;status&#x2F;1867739765610811665" rel="nofollow">https:&#x2F;&#x2F;x.com&#x2F;wetw0rk_bot&#x2F;status&#x2F;1867739765610811665</a>