Skip to content

A Pseudo-Secure TCP Reverse Shell Implementation for ARM-based Systems

License

Notifications You must be signed in to change notification settings

manoel-serafim/RevARM

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

RevARM: A Pseudo-Secure TCP Reverse Shell Implementation for ARM-based Systems

Overview

RevARM is an implementation of a TCP reverse shell for ARM-based systems. It provides the impression of security and an extremely efficient way to remotely access ARM-based devices. A C2(command and control framework) can be implemented on top of it in order to manage a range of devices.

Usage

To use RevARM, you need to assemble and link the source code in an ARM-based device using the following commands:

as -o reverse.o reverse.s
ld -o reverse reverse.o

You can also use objcopy and xxd in order to generate needed shellcode.

As an addendum, in order to prevent misuse, the payload creator is not included in this repository. If you wish to use RevARM, you will need to modify the source code before assembling and linking it. This is to enforce that RevARM will be only used for educational and research purposes

License

RevARM is released under the GNU General Public License v2.0. See the LICENSE file for more details.

Disclaimer

RevARM is intended for educational and research purposes only. It is the end user's responsibility to obey all applicable laws regarding the use of RevARM.

About

A Pseudo-Secure TCP Reverse Shell Implementation for ARM-based Systems

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published