-
I tested on my local system, but i got this error:
root@localhost:/home/# python3 CVE-2024-6387.py
Intentando explotación con base de glibc: 0xb7200000
Intento 0 de 100
Error al recibir versión …
-
Gather all of the shellcode in the shellcode repo into a sqllite database. Each piece of shellcode should accept arguments to control things like IP addresses and ports.
I would probably assemble th…
-
Thanks for sharing this great project,i've tried with cobaltstrike shellcode both x86 x64 but didnt work any idea thanks
-
How would one go about replacing the payload here with another? Can the current kernel32 stuff be used, or would you have to make your own? I want to be able to use my own encoded shellcode. Thanks, a…
-
Hi, I am trying as POC to load AKAGI64 from a shellcode, but for some reason when I try to run the shellcode generated by donut, it just doesn't start. but for some reason when I try to run the shellc…
-
You must be knowing that the lazagne.exe is heavily signatured by all AVs. So to make it evasive on remote systems, security researchers generally convert the exe to shellcode using some handy tool li…
-
payload.bin: cobaltstrike 4.4 x86 shellcode(stager) , which already replaced apihash by this tool.
And when I use blobrunner(x86) to load it , crashed
GG-o1 updated
2 years ago
-
A test failed on a tracked branch
```
Error: expect(received).toStrictEqual(expected) // deep equality
- Expected - 223
+ Received + 1
- Object {
- "value": Object {
- "linux": Object {
-…
-
Hello. I would like to test this vulnerability on my routers, but I can't find a suitable shellcode. Could you tell me which shellcode was used in the demonstration?
APT64 updated
2 years ago
-
### Package Name
runsc
### Tool Name
runsc32.exe and runsc64.exe
### Package type
ZIP_EXE
### Tool's version number
1.0.0
### Category
Utilities
### Tool's authors
Evan H. Dygert
### Tool'…