metasploit-framework/external/source/shellcode/windows
Tod Beardsley 520d1e69c4
Rapid7 Comma Inc
After some more discussion with Rapid7's legal fellow.
2014-03-13 09:46:20 -05:00
..
msf2
speech
templates
x64 Fixed memory alignment for x64 reverse_http stager 2013-09-16 16:51:37 -04:00
x86 Fix infinite-retry bug 2014-02-04 11:59:16 -06:00
README
build.sh
midstager.asm
single_adduser.asm
single_exec.asm
single_shell_bind_tcp.asm
single_shell_bind_tcp_xpfw.asm
single_shell_reverse_tcp.asm
stage_shell.asm
stage_upexec.asm
stager_bind_ipv6_tcp_nx.asm Rapid7 Comma Inc 2014-03-13 09:46:20 -05:00
stager_bind_tcp.asm
stager_bind_tcp_nx.asm
stager_find_tag.asm
stager_reverse_http.asm
stager_reverse_ipv6_tcp_nx.asm Rapid7 Comma Inc 2014-03-13 09:46:20 -05:00
stager_reverse_ord_tcp.asm
stager_reverse_tcp.asm
stager_reverse_tcp_nx.asm

README

This directory contains the win32 payload development environment used
for creating the payloads in version 3 of the Metasploit Framework.

The 'nasm' executable must be in your path to use the included build.sh tool.

The included 'build' script automatically creates a number of file types
each time it used to compile a payload. These file types are:

    - Native ELF executable
    - Win32 PE executable
    - Generated C source code
    - Raw opcodes in ".bin" format

The PE executable templates were developed by 'rix' and used with permission.

To use this script, simply run ./build.sh <name of payload>, where the name
does not include the ".asm" suffix. To build win32_stage_api.asm, the 
command line would be "./build.sh win32_stage_api".