b1dbb50953
commit 2b24a5e93da0b0dd61c29b6124794fa11c5b3d92 Author: scriptjunkie <scriptjunkie@scriptjunkie.us> Date: Sun Apr 15 22:01:23 2012 -0500 Document HTTPS options for Proxy commit 24a8635b96d723465eb2bf212c83d31325990c28 Author: scriptjunkie <scriptjunkie@scriptjunkie.us> Date: Sun Apr 15 21:52:47 2012 -0500 Document HTTPS options [Closes #337] |
||
---|---|---|
.. | ||
msf2 | ||
speech | ||
templates | ||
x64 | ||
x86 | ||
README | ||
build.sh | ||
midstager.asm | ||
single_adduser.asm | ||
single_exec.asm | ||
single_shell_bind_tcp.asm | ||
single_shell_bind_tcp_xpfw.asm | ||
single_shell_reverse_tcp.asm | ||
stage_shell.asm | ||
stage_upexec.asm | ||
stager_bind_ipv6_tcp_nx.asm | ||
stager_bind_tcp.asm | ||
stager_bind_tcp_nx.asm | ||
stager_find_tag.asm | ||
stager_reverse_http.asm | ||
stager_reverse_ipv6_tcp_nx.asm | ||
stager_reverse_ord_tcp.asm | ||
stager_reverse_tcp.asm | ||
stager_reverse_tcp_nx.asm |
README
This directory contains the win32 payload development environment used for creating the payloads in version 3 of the Metasploit Framework. The 'nasm' executable must be in your path to use the included build.sh tool. The included 'build' script automatically creates a number of file types each time it used to compile a payload. These file types are: - Native ELF executable - Win32 PE executable - Generated C source code - Raw opcodes in ".bin" format The PE executable templates were developed by 'rix' and used with permission. To use this script, simply run ./build.sh <name of payload>, where the name does not include the ".asm" suffix. To build win32_stage_api.asm, the command line would be "./build.sh win32_stage_api".