You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Yes, this I think should be easy to implement. When iterating over the program header entries we would need to check if there is any entry of type GNU_STACK and check if its permissions include execution, if so then add another piece of shellcode to call mprotect().
Since this is a feature request I may take my time to do this.
arget13
changed the title
[Idea] Possibility to make the stack executable
Possibility to make the stack executable
Mar 13, 2022
Hello:
Sometimes we would like to run code on the stack. For example, a msfvenom reverse shell in C that is written and executed from the stack.
Right now the code does not support stack execution but it could be an option for the future.
Greetings.
The text was updated successfully, but these errors were encountered: