EntySec / HatSploit

Modular penetration testing platform that enables you to write, test, and execute exploit code.
https://hatsploit.com
MIT License
277 stars 62 forks source link

offset substitution problem #81

Closed miralayipouya closed 2 years ago

miralayipouya commented 2 years ago

Hi @enty8080 Do you have any plans for using encoders? When I do encoding on a shellcode, I ran into BadChars problem \x00 messing with the compiler and if I try to remove badChars manually I will mess up offset substitutions. Cheers Bro!

enty8080 commented 2 years ago

Hello, @miralayipouya What payload did you use?

miralayipouya commented 2 years ago

Hi @enty8080 I appreciate your response. I was trying to use hatsploit/payloads/windows/x64/shell_reverse_tcp.py payload and I want to get rid of \x00 inside the shellcode. Cheers Bro!

enty8080 commented 2 years ago

@miralayipouya I think it is not possible to write a completely null-free shellcode for Windows, but we'll try later.