-
Hey there,
the payload or malicious PE file should be on the fileytem here. Mostly it will be already fished away by AV, especially if it is malicious or suspicious enough :-)
In my case for tes…
-
### Description of the bug
Since a while (I unfortunately don't know when) but currently 2.6.1 the hollow algorithm generates a new mesh for the outer shell.
Every triangle is densely tessellated …
-
Since the System Firmware P_V341 will only recognize the file name of ***.pws** as stated in point 14 in user manual.
... and that file format not yet supported by other slicer softwares such as ch…
-
## Description
Using Posh_v4_x64_Shellcode.bin in a Dropper leveraging Process Hollowing tradecraft (See file attached below) doesn't return an implant
## Execution Environment:
**All of this m…
-
### Description of the bug
I add the drainage holes then select PREVIEW HOLLOWED AND DRILLED MODEL or select SLICE NOW.
I get an "Access Violation" error message both ways.
![Drainage hole issue - …
-
As github does not offer a better repository for images, this issue will be used as one. This issue will be closed right away to be hidden.
![image](https://user-images.githubusercontent.com/583094…
-
### Description of the bug
In this 3d model
the infill for the second object is 0% (lazy man's hollowing), it has some stuff at the bottom that generates a bottom layer and i've set the amount of …
-
In GitLab by @AaBelov on Aug 19, 2016, 01:06
ICE uses quadratic programming to find abundances on each iteration. The current `lsei` method seems to be slow.
-
Hi hasherezade,
Thanks for your great tool. I tested hollows_hunter, it can detect hollow process created by Agenttesla, fareit, formbook. However, it can't detect iexplore.exe created by ursnif tr…
-
Hi,
It seems it occurred with recent taxadb, but the databases are created in `WAL` mode. Hence, there is no way to open them if they are located in a read-only directory.
example:
```sh
$ sql…