Backdoor tool for ELF files
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
sp0re c9ca61632d New feature 10 months ago
ELF.py first commit 10 months ago
ELFEnum.py first commit 10 months ago
README.md New feature 10 months ago
main.py New feature 10 months ago
sh64.sc New feature 10 months ago
test_code64 New feature 10 months ago
test_code64.c New feature 10 months ago
test_code64.pwned New feature 10 months ago
test_sc64 now works for all x64 elfs 10 months ago
test_sc64.s now works for all x64 elfs 10 months ago

README.md

Backit!

WIP

backdoor tool to easily backdoor elf executables. You by default it will change the binary entry point to the shellcode location, and jump to the legit entry point after the shellcode execution. You can change the location where the shellcode is executed by using the -e flag and specifiying an hex value. Warning, it will change 5 bytes at the location to set a call to the shellcode. This feature is still in dev. Still it let you for instance fire your shellcode only if you add an argument to the binary, and not everytime to run it. So it’s more stealthy.