Logo
Explore Help
Sign In
adam/metasploit-gs
1
0
Fork 0
You've already forked metasploit-gs
Code Issues Pull Requests Actions Packages Projects Releases Wiki Activity
Files
b70b41091bac9409f62d6b5ccc95cb48f7336ffb
metasploit-gs/external/source/shellcode/windows/x86
T
History
HD Moore b70b41091b Tested fairly well - this randomizes the URLs and removes the user-agent string from the request
2012-03-02 17:44:23 -06:00
..
bin
Add empty directories from svn repo.
2011-11-09 18:41:40 -06:00
src
Tested fairly well - this randomizes the URLs and removes the user-agent string from the request
2012-03-02 17:44:23 -06:00
build.py
Merge in a rewritten windows x86 reverse_ipv6_tcp stager (The previous one seems hosed since r6744 due to new host/port offsets[1] but the shellcode blob remained the same after modification[2]) - This new one uses the block_api_call technique, is 37 bytes smaller and can handle arbitrary size stages.
2011-05-08 01:44:08 +00:00
Powered by Gitea Version: 1.26.1 Page: 114ms Template: 6ms
Auto
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API