-
## About accounts on [capesandbox.com](https://capesandbox.com/)
* Issues isn't the way to ask for account acctivation. Ping capesandbox in [Twitter](https://twitter.com/capesandbox) with your userna…
-
Hello Unam! I'm already ashamed to ask you for something, so I apologize in advance for taking up your time. Yesterday I asked about the shellcode, so that's what I needed it for. As I understand it, …
-
Hi. I used your code repo to generate the b64 payload and key strings and compiled the ProcessInjection.cs template using VS2019. The executable works fine with AV turned off and gets a meterpreter se…
-
First, thank you so much for your work on winim.
I'm a security researcher and I'm working to rewrite some C/C++ process injection methods in Nim while I also document detections and work on evasio…
-
Hi. I enabled the "Pause for Obfuscation" function, compiled the miner and the Watchdog message window appeared. I want to know in detail what I need to do after this window appears? Thanks!
-
bro i got all in all over 200 clients with a good gpu with 4gb+ they all had Windows defender and i cant get more then 200 mh/s
because only 4 miners at the same time are on the dashboard i use steal…
-
Execute exe after successful injection, but shellcode is not loaded
-
use same way as https://github.com/outflanknl/Dumpert
to dump lsass for evasion.
-
-
I am generating shellcode with donut, specifying x64. The CPL loader works as expected, but the binary loader does not:
![output](https://user-images.githubusercontent.com/9327972/127433637-e768f74f-…