SkillAgentSearch skills...

Midrashim

PT_NOTE to PT_LOAD x64 ELF infector written in Assembly

Install / Use

/learn @guitmz/Midrashim
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

Linux.Midrashim

This is my first x64 ELF infector written in full Assembly. It contains a non destructive payload and will infect other ELF (PIE is also supported) on current directory only and not recursively. It uses PT_NOTE to PT_LOAD infection technique.

Build

Assemble it with FASM x64.

$ fasm Linux.Midrashim.asm
flat assembler  version 1.73.25  (16384 kilobytes memory, x64)
3 passes, 2631 bytes.

$ file Linux.Midrashim
ELF 64-bit LSB executable, x86-64, version 1 (GNU/Linux), statically linked, stripped

$ sha256sum Linux.Midrashim
8f1a835ad6f5c58b397109e28409ec0556d6d374085361c6525f73d5ca5785eb  Linux.Midrashim

Demo

asciicast

References:

  • https://www.symbolcrash.com/2019/03/27/pt_note-to-pt_load-injection-in-elf
  • https://www.wikidata.org/wiki/Q6041496
  • https://legacyofkain.fandom.com/wiki/Ozar_Midrashim
  • https://en.wikipedia.org/wiki/Don%27t_Be_Afraid_(album)

Related Skills

View on GitHub
GitHub Stars49
CategoryDevelopment
Updated4mo ago
Forks7

Languages

Assembly

Security Score

92/100

Audited on Dec 1, 2025

No findings