https://github.com/qyfashae/memfd_create_2023_exploit
EDUCATIONAL PURPOSES ONLY! Linux/x64 reverse TCP shell exploit via ELF memory processing
https://github.com/qyfashae/memfd_create_2023_exploit
exploit linux-exploits python3 shellcode zero-day
Last synced: 11 months ago
JSON representation
EDUCATIONAL PURPOSES ONLY! Linux/x64 reverse TCP shell exploit via ELF memory processing
- Host: GitHub
- URL: https://github.com/qyfashae/memfd_create_2023_exploit
- Owner: Qyfashae
- License: bsd-3-clause
- Created: 2023-09-05T13:10:40.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-09-05T13:33:37.000Z (over 2 years ago)
- Last Synced: 2025-03-27T20:49:01.222Z (11 months ago)
- Topics: exploit, linux-exploits, python3, shellcode, zero-day
- Language: Python
- Homepage:
- Size: 4.88 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# memfd_create_2023_Exploit
EDUCATIONAL PURPOSES ONLY! Linux/x64 reverse TCP shell exploit via ELF memory processing.
You can use this for fileless ELF execution because no data is written to disk.