-
I've got a question for the team/the dev. How did you convert your c/c++ source to position independent shellcode? Could you possibly write a tutorial or a youtube video. Very interested!
ghost updated
4 years ago
-
**Bug**
**Description:**
Compiling GruntStager code for binary after making some edits to the code to be able to bypass Windows Defender detection returns a 404 error from the server: **The remote…
-
@hlldz Not compiling on visual studio 2017.
-
@r00t-3xp10it Not getting meterpreter shell
Windows payload with agent 3 PY(Pyherion/NXcrypt)
Tested on windows 10 v1809 and v1903
Used pyinstaller for compilation,didn't use pyherion and nxcrypt.
-
## Steps to reproduce
How'd you do it?
1. Use evasion/windows/windows_defender_exe
2. Set payload windows/meterpreter/reverse_https
3. Set listener options
4. run (generates the exe)
5. sta…
-
The shellcode_hash_search plugin crashes during execution due to an apparently 64 bit integer size problem with the underlying SQLite DB.
```
----------------------------------------------------…
-
The ability to run execve() on files within an application's home directory will be removed in target API > 28.
Here is the issue on Google bug tracker:
https://issuetracker.google.com/issues/128554…
-
The vulnerability is in function b642conf at sub2conf_api.py(line 45)
In this function,to convert a string to a dict,the author used function eval to do so.
```
def b642conf(self, prot, tp, b64…
-
Attempting to use shellcode hash search for 64-bit IDBs may elicit the following error (hand-typed, HOPEFULLY free of transcription errors):
```
Traceback (most recent call last):
File "C:/Prog…
-
Good morning/evening everyone;
As discusses with @TheWover yesterday, a command line switch for enabling/disabling shellcode encryption would be a good idea.
At the moment, the shellcode is encr…