-
![df2c487ec6ff3b2fe69843c9440fe16](https://github.com/user-attachments/assets/5e9fbd97-33ef-40aa-b713-4afd86ef1ac3)
i have compiled this tools but i dont know how to use it. could you give me some ad…
-
Hi, I think your codes may be useful for my project. But I wonder how many shellcodes can be analyzed by your program? A large number of different shellcodes or just very limited specific kind of shel…
-
Hello,
first of all, you have a nice and interesting project here. I have tested it with different calc.exe shellcodes, and the calculator always popped up. My testing also included using the origi…
-
**The bug**
I recently compiled sliver for arm64 to use on my old Raspberry Pi 3
**To Reproduce**
Steps to reproduce the behavior:
`generate beacon -b https://10.0.0.178 -f shellcode`
![image](…
-
search for exploits in exploitdb will not work,
because regex go through filenames, which are for example 27526.tgz
instead in looking in exploitdb/files_{exploits, shellcodes}.csv and
return s…
-
Currently they are a byte sequence. Should be an assembly sources, preferably compilable by rasm2.
-
It would be great to have the option for selecting the second stage payloads on handler. This option could allow deploying multi stage payloads other than meterpreter and widens the attack surface. Wi…
-
J'ai essayé ton programme c pour ajouter un user en root mais j'obtiens une erreur de segmentation. Pourtant je suis sur debian 11. Apres je suis nouveau dans le monde des shellcodes.
Length: 390
Er…
-
I am running amun honeypot on mhn and it has been recording attacks and logging normally. However, there are no files in the Malware folder: it has failed to download binaries and shellcodes. Please h…
-
python3.9 环境下运行 kunyu console 报一下出错:
`Traceback (most recent call last):
File "/usr/local/bin/kunyu", line 33, in
sys.exit(load_entry_point('kunyu==1.6.1', 'console_scripts', 'kunyu')())
…
GH-JY updated
2 years ago