metasploit-framework/external/source/shellcode/windows
HD Moore 422e58c51f Close the listening socket, allows the same shellcode to beused on the same port repeatedly, thanks antoine!
git-svn-id: file:///home/svn/framework3/trunk@5705 4d416f70-5f16-0410-b530-b9f4589650da
2008-10-01 16:16:34 +00:00
..
msf2 Adds initial support for IPv6, including two stager. Tested Meterpreter over IPv6 stages on XP and Vista. Using this is still tricky, I will add a wiki page tomorrow to explain the ScopeID stuff for link-local testing. This commit also includes the raw (oversized) assembler for the stagers as well as the entire old metasploit assembly set (useful for development). 2008-08-22 06:34:57 +00:00
templates Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
README Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
build.sh Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
midstager.asm Patch from Stephen Fewer from Harmony Security, makes the midstager uses VirtualAlloc with RWX, solves a number of issues, specifically stack space starvation for large payloads. 2008-09-24 22:54:30 +00:00
single_adduser.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_exec.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_bind_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_bind_tcp_xpfw.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_reverse_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stage_shell.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stage_upexec.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_bind_ipv6_tcp_nx.asm Adds initial support for IPv6, including two stager. Tested Meterpreter over IPv6 stages on XP and Vista. Using this is still tricky, I will add a wiki page tomorrow to explain the ScopeID stuff for link-local testing. This commit also includes the raw (oversized) assembler for the stagers as well as the entire old metasploit assembly set (useful for development). 2008-08-22 06:34:57 +00:00
stager_bind_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_bind_tcp_nx.asm Close the listening socket, allows the same shellcode to beused on the same port repeatedly, thanks antoine! 2008-10-01 16:16:34 +00:00
stager_find_tag.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_http.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_ipv6_tcp_nx.asm Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
stager_reverse_ord_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_tcp_nx.asm Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00

README

This directory contains the win32 payload development environment used
for creating the payloads in version 3 of the Metasploit Framework.

The 'nasm' executable must be in your path to use the included build.sh tool.

The included 'build' script automatically creates a number of file types
each time it used to compile a payload. These file types are:

    - Native ELF executable
    - Win32 PE executable
    - Generated C source code
    - Raw opcodes in ".bin" format

The PE executable templates were developed by 'rix' and used with permission.

To use this script, simply run ./build.sh <name of payload>, where the name
does not include the ".asm" suffix. To build win32_stage_api.asm, the 
command line would be "./build.sh win32_stage_api".