https://github.com/oelin/vessle
A simple "bind shell" written in x86 assembly for Linux.
https://github.com/oelin/vessle
assembly bind-shell security x86 x86-32
Last synced: about 1 month ago
JSON representation
A simple "bind shell" written in x86 assembly for Linux.
- Host: GitHub
- URL: https://github.com/oelin/vessle
- Owner: oelin
- License: mit
- Created: 2023-01-21T21:55:28.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-01-21T22:09:08.000Z (over 2 years ago)
- Last Synced: 2025-03-12T05:33:00.659Z (7 months ago)
- Topics: assembly, bind-shell, security, x86, x86-32
- Language: Assembly
- Homepage:
- Size: 7.81 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Vessle
A simple "bind shell" written in x86 assembly for Linux.
## About
A bind shell is a program which creates a network-accessible shell such that commands can be executed remotely on the target machine. Bind shells are often used as part of malware payloads, however they also have benign uses. This particular implementation listens for connections on `tcp://0.0.0.0:1234` and is unauthenticated.
## Compile And Run
Compile it with NASM.
```sh
$ nasm -f elf32 -o vessle.o vessle.asm
$ ld -m elf_i386 vessle.o -o vessle
$ rm vessle.o
```Run it.
```sh
$ ./vessle
```Connect to the shell on port 1234.
```sh
$ nc -v [target IP] 1234
```