metasploit-framework/external/source/shellcode/windows
Matthias Ganz 4eaf1ace81 Bugfix loading address of library path into rcx
The old code breaks if the payload is executed from a memory area where the 4 most significant bytes are non-zero.
2015-11-02 16:56:07 +01:00
..
msf2 removing them 2009-05-20 17:51:45 +00:00
speech Add Skylined's "You Got Pwned" payload 2011-01-06 17:34:09 +00:00
templates Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
x64 Bugfix loading address of library path into rcx 2015-11-02 16:56:07 +01:00
x86 Fix comments 2015-03-11 21:32:35 -05:00
README Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
build.sh Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
midstager.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
single_adduser.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_exec.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_bind_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_bind_tcp_xpfw.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_reverse_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stage_shell.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stage_upexec.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_bind_ipv6_tcp_nx.asm Rapid7 Comma Inc 2014-03-13 09:46:20 -05:00
stager_bind_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_bind_tcp_nx.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
stager_find_tag.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_http.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_ipv6_tcp_nx.asm Rapid7 Comma Inc 2014-03-13 09:46:20 -05:00
stager_reverse_ord_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_tcp_nx.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00

README

This directory contains the win32 payload development environment used
for creating the payloads in version 3 of the Metasploit Framework.

The 'nasm' executable must be in your path to use the included build.sh tool.

The included 'build' script automatically creates a number of file types
each time it used to compile a payload. These file types are:

    - Native ELF executable
    - Win32 PE executable
    - Generated C source code
    - Raw opcodes in ".bin" format

The PE executable templates were developed by 'rix' and used with permission.

To use this script, simply run ./build.sh <name of payload>, where the name
does not include the ".asm" suffix. To build win32_stage_api.asm, the 
command line would be "./build.sh win32_stage_api".