optiv / ScareCrow

ScareCrow - Payload creation framework designed around EDR bypass.
2.71k stars 503 forks source link

runtime.cgocall() Issue #68

Closed kwoodilla closed 1 year ago

kwoodilla commented 1 year ago

When executing a on a target system with console enabled I receive an error at the "Overwriting Shellcode String with Pointers Attributes" step

The initial error on screen is runtime.cgocall()

compiled with ./ScareCrow -I -console -domain

kwoodilla commented 1 year ago

Issue resolved - forgot I had to use a stageless payload

Tylous commented 1 year ago

sounds good. Glad it was resolved.