Join GitHub today
GitHub is home to over 36 million developers working together to host and review code, manage projects, and build software together.Sign up
Add metasm format of code for Super small Shell Bind TCP Random Port #11374
The shellcode is going to upgrade/complement the old one https://github.com/rapid7/metasploit-framework/blob/master/modules/payloads/singles/linux/x86/shell_bind_tcp_random_port.rb which size is 57. The functionality is virtually the same but the size if SIGNIFICANTLY (44 against 57!) smaller which makes it unique in its kind.
This payload is really tiny since it uses nc by opening a random port.
Tested on Linux 4.9.0-7-amd64 #1 SMP Debian 4.9.110-1 (2018-07-05) x86_64 GNU/Linux
Please review it.
referenced this pull request
Feb 9, 2019
yes, I am aware of it. And this is a deliberate approach to make it the tiniest one!
May 17, 2019
I added 9ae01c9 which merged this payload into the existing bind payload. This makes it automatically invoked as needed rather than having to evaluate a different payload entirely (this pattern is in many other payloads as well.) If you pass
Note also that I had to rename