metasploit-framework/external/source/shellcode/windows/x64
Matthias Ganz 4eaf1ace81 Bugfix loading address of library path into rcx
The old code breaks if the payload is executed from a memory area where the 4 most significant bytes are non-zero.
2015-11-02 16:56:07 +01:00
..
bin create x64_reverse_https stagers 2013-05-13 01:41:56 +02:00
src Bugfix loading address of library path into rcx 2015-11-02 16:56:07 +01:00
build.py For now just adding in the new APC migrate stubs and the wow64->x64 exec stub. (fix up the build scripts and use a dedicated migrate directory for this stuff). 2010-01-22 14:03:53 +00:00