-
I have been using mythic for doing some amazing Red Team engagements. For MAC envs, Mythic is my go to. **KUDOS** to you people! However, when I generated payload for windows, I got blocked by defende…
-
Hello!
**Describe the bug**
Seems like the P/Invoke signature for QueueUserAPC in Kernel32 is off. Specifically, it is not accepting the memory handle as the first parameter (Kernel32.PAPCFUNC). T…
-
I am countering issue when try to encode existing msfvenom exe
msvcp140.dll missing
Terminal output:
(venv) C:\Users\Administrator\inceptor\inceptor>cd ..
(venv) C:\Users\Administrator\incep…
-
how to use this with putty than popcalc or metalsploit payload generated?
-
I'm trying to convert Meterpreter shellcode into UUID, unsuccessfully. Do you mind giving an example of how to convert it?
![image](https://user-images.githubusercontent.com/31028818/115382566-853…
-
I'm trying to replace in POC calc.exe with cmd.exe. I'm generating shellcode using msf:
`msfvenom -p windows/x64/exec CMD = 'cmd.exe'`
Then convert shellcode with convert_shellcode.js but when I exe…
-
as I can see in source, it's just wrapper around nasm, ld, and objdump.
can this tool convert elf binary to shellcode? for ex, if compile it with `musl-gcc` and `-static`
thanks.
-
A simple program compiled with VC2010 (settings: "Use MFC in a Static Library"):
```cpp
#include
#pragma comment (lib, "user32.lib")
#ifdef _M_X64
int __fastcall wWinMain
#else
int __stdcall w…
-
I use msf create shellcode shellcode=\xfc\xe8\x82\x00\x00\x00\x60\x89\xe5\x31\xc0\x64\x8b\x50\x30\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26\x31\xff\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\…
-
First, thanks for all your contribution on Offensive Nim in regards to InfoSec . I am a learner on the subject who started dabbling in Offensive Nim some time ago. I have seen brilliant Marcello's wor…