Netelf
Run executables from memory, over the network, on Windows, Linux, OpenVMS... routers... spaceships... toasters etc.
Install / Use
/learn @XiphosResearch/NetelfREADME
NetELF
Run the client side of NetELF to download and execute a program over the network from a server. The server sends an arbitrary binary and command-line arguments.
Where possible it will execute the program in-memory, it will not leave files on the filesystem. This makes it ideal for pentests, emergencies and general systems automation.
Originally inspired by a post on this post on comp.unix.programmer.
Supported Platforms
Fully supported & tested:
- Linux
- Windows 7
Regularly tested & partially supported:
- Solaris x86, Sparc
- OpenVMS VAX, Alpha
- Ultrix VAX, RISC
- Windows 95+, NT 3.51+
Others that it should work on
- FreeBSD
- OSX
- OSF/1
- HP-UX
- QNX
- z/OS
Example
make
./server.py /bin/ls -la &> /dev/null &
./netelf 127.0.0.1 1337
./netelf 127.0.0.1 1337
In-memory Execution
I looked into the source code for glibc and musl to see what goes on behind the scenes, interesting, it executes the file from /proc/self/fd/%d.
See the following:
Mount options on tmpfs permiate through to /proc/self/fd/, so to disable you need to add noexec to /dev/shm and other tmpfs mounts:
sudo mount /dev/shm/ -o remount,rw,nosuid,nodev,noexec -t tmpfs
This causes fexecve: Permission denied because the shm_open succeeded, but silently the file descriptor didn't get +x permission, doing fchmod on the handle won't work either. The file permissions can be checked with fstat.
Regarding which executables will work with this technique, the most reliable have been self-contained, statically linked executables. In some cases (where the same libc was used on the host used to compile the executable and on the host it is being executed on, and where both have the same libraries/dependencies), dynamically linked executables have worked. Executables which rely on specific environments or external files generally tend to fail.
Furthermore, it is possible to pass arguments to the executable you are running in-memory! The name of the process is derived from argv[0], this can be customised using --argv0 [kthreadd]. By default it will use the basename of the executable file.
Related Skills
node-connect
343.1kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
90.0kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
343.1kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
343.1kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
