Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
BSD 3-Clause "New" or "Revised" License
3.53k
stars
628
forks
source link
Module Overloading is not executing payload correctly #115
Module overloading in dev is not executing the payload correctly. Though it was working before?
Have done a bit of testing, but not a lot. It's confusing because there is not much difference in the code other than how memory is allocated. So track down the difference. I did notice that some of the sections of the PE had different sizes or memory permissions between non-ovreloaded and overloaded. It isn't apparent why.
Module overloading in
dev
is not executing the payload correctly. Though it was working before?Have done a bit of testing, but not a lot. It's confusing because there is not much difference in the code other than how memory is allocated. So track down the difference. I did notice that some of the sections of the PE had different sizes or memory permissions between non-ovreloaded and overloaded. It isn't apparent why.
Anyway, figure it out before release.