Files
metasploit-gs/modules/exploits/linux/http
Valentin Lobstein 70dd190bc7 Fix: Inline shellcode via asm db instead of mmap RWX
Use Metasm's asm("db ...") to embed shellcode directly in .text section
which is executable by default. Removes mmap/memcpy/mprotect entirely,
avoiding RWX or W^X allocations that IDS may flag.

Parent process uses _exit(0) instead of return since the inlined
shellcode bytes follow the setsid() call in the instruction stream.

Co-Authored-By: jvoisin <325724+jvoisin@users.noreply.github.com>
2026-02-24 23:32:05 +01:00
..
2025-12-18 10:08:31 -05:00
2025-06-24 11:21:49 +01:00
2023-08-28 17:39:02 -04:00
2025-12-18 10:08:31 -05:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2024-05-13 16:55:43 -04:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2026-01-13 14:24:04 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2025-10-07 13:59:13 -04:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2025-12-19 15:38:43 +00:00
2025-10-07 13:59:13 -04:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2025-12-18 10:08:31 -05:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-12-18 10:08:31 -05:00
2024-09-05 08:49:32 -07:00
2025-10-07 13:59:13 -04:00
2025-12-18 10:08:31 -05:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00
2025-06-24 11:21:49 +01:00