Commit Graph

11 Commits

Author SHA1 Message Date
Miroslav Stampar
521da5e734 Fixes #5137 2022-07-13 22:27:26 +02:00
Miroslav Stampar
86467e196b Periodical recloak 2021-02-19 11:08:14 +01:00
Miroslav Stampar
eeffcfe1b6 Periodic recloaking (AV) 2020-12-18 11:57:13 +01:00
Miroslav Stampar
226d467f6d Fixes #4321 2020-08-31 22:06:22 +02:00
Miroslav Stampar
bbdedb39f9 Fixes #4233 2020-06-14 21:23:55 +02:00
Miroslav Stampar
265a78b455 Fixes #1379 2015-08-31 14:27:47 +02:00
Miroslav Stampar
8e2f4669d8 Removing dependency for bz2 as there are some reported problems with the library on non-standard platforms 2013-10-02 20:32:18 +02:00
Miroslav Stampar
96e5d5d178 Some more updates for an Issue #295 2013-01-07 16:55:41 +01:00
Bernardo Damele
224e6376a6 cleanup to README files 2012-07-17 00:32:32 +01:00
Miroslav Stampar
0b54553a76 quick fix for AV engines 2011-12-21 10:22:03 +00:00
Bernardo Damele
e35f25b2cb Major recode of --os-pwn functionality. Now the Metasploit shellcode can not be run as a Metasploit generated payload stager anymore. Instead it can be run on the target system either via sys_bineval() (as it was before, anti-forensics mode, all the same) or via shellcodeexec executable. Advantages are that:
* It is stealthier as the shellcode itself does not touch the filesystem, it's an argument passed to shellcodeexec at runtime.
* shellcodeexec is not (yet) recognized as malicious by any (Avast excluded) AV product.
* shellcodeexec binary size is significantly smaller than a Metasploit payload stager (even when packed with UPX).
* UPX now is not needed anymore, so sqlmap package is also way smaller and less likely to be detected itself as malicious by your AV software.
shellcodeexec source code, compilation files and binaries are in extra/shellcodeexec/ folder now - copied over from https://github.com/inquisb/shellcodeexec.
Minor code refactoring.
2011-04-24 23:01:21 +00:00