xocopy Logo

xocopy

0
Free
Updated 11 March 2025
Visit Website

Sometimes when you're on a Unix system where you do not have admin privileges, you can come across programs with strange permissions such as the following: -rwx--x--x 1 root root 56152 Jul 1 12:37 runme. The permissions are set so that anyone can execute this program, but only the file owner can read the program. However, this is not true. If somebody can execute the program, they can copy it by reading it from memory once the program has been loaded. xocopy is a program that can copy executables with execute, but no read permission. It has been tested on FreeBSD and Linux kernels 2.[246].x. Limitations: Does not work with SUID or SGID executables on Linux 2.2.x. However, it works fine on 2.4.x and 2.6.x. Limited to ELF executables. Can only copy programs that have the ELF header and program header table inside a loadable segment. GCC does this by default. Download xocopy.c

FEATURES

SIMILAR TOOLS

Collects Yara rules from over 150 free resources, a free alternative to Valhalla.

Assembler/disassembler for the dex format used by Dalvik, Android's Java VM implementation.

YARA is a tool for identifying and classifying malware samples based on textual or binary patterns.

Guide on emulating Raspberry Pi with QEMU and exploring Arm TrustZone research.

Fuzzilli is a JavaScript engine fuzzer that helps identify vulnerabilities in JavaScript engines.

Yabin creates Yara signatures from malware to find similar samples.

A Burp Suite plugin for automatically adding XSS and SQL payload to fuzz

A minimal, consistent API for building integrations with malware sandboxes

A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

Copyright © 2025 - All rights reserved