metasploit-framework/external/source/shellcode/windows/x64
Matthias Ganz 4eaf1ace81 Bugfix loading address of library path into rcx
The old code breaks if the payload is executed from a memory area where the 4 most significant bytes are non-zero.
2015-11-02 16:56:07 +01:00
..
bin create x64_reverse_https stagers 2013-05-13 01:41:56 +02:00
src Bugfix loading address of library path into rcx 2015-11-02 16:56:07 +01:00
build.py