root@deepquest.code511.com:~# 

>> [shellcode] Linux/ARM64 – Egghunter (PWN!PWN!) + execve("/bin/sh", NULL, NULL) + mprotect() Shellcode (88 Bytes)

Linux/ARM64 – Egghunter (PWN!PWN!) + execve(“/bin/sh”, NULL, NULL) + mprotect() Shellcode (88 Bytes)

TAGS: #0day#remote exploit

> POST_COMMENT