Logo
Explore Help
Sign In
adam/metasploit-gs
1
0
Fork 0
You've already forked metasploit-gs
Code Issues Pull Requests Actions Packages Projects Releases Wiki Activity
Files
4eaf1ace814ee8a5afc3669280b89bbeb79125ed
metasploit-gs/external/source/shellcode/windows/x64/src
T
History
Matthias Ganz 4eaf1ace81 Bugfix loading address of library path into rcx
The old code breaks if the payload is executed from a memory area where the 4 most significant bytes are non-zero.
2015-11-02 16:56:07 +01:00
..
block
Fix #5988, windows x64 stagers
2015-09-28 15:52:50 -05:00
migrate
Commit the updated APC injection stubs. fixes a nasty issue in some edge cases whereby when using APC injection for a process in another session then the current host process the injected APC can cause an access violation in kernel32 during a call the kernel32!CreateThread caused by the APC's host thread not having an initialized Activation Context inside its TEB. We now test for this and create a dummy ActivationContext entry to appease the kernel. This will both improve DLL injection reliability as well as meterpreter migration reliability.
2010-03-11 17:00:19 +00:00
single
Bugfix loading address of library path into rcx
2015-11-02 16:56:07 +01:00
stage
Round 3 of x64 support from Stephen Fewer - new payloads!
2009-08-27 19:29:54 +00:00
stager
Touchup on author credit
2013-05-30 16:13:40 -05:00
Powered by Gitea Version: 1.26.1 Page: 205ms Template: 5ms
Auto
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API