metasploit-framework/external/source/shellcode/windows
James Lee c70680cf1c
Fix infinite-retry bug
Derp, block_api clobbers ecx
2014-02-04 11:59:16 -06:00
..
msf2 removing them 2009-05-20 17:51:45 +00:00
speech Add Skylined's "You Got Pwned" payload 2011-01-06 17:34:09 +00:00
templates Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
x64 Fixed memory alignment for x64 reverse_http stager 2013-09-16 16:51:37 -04:00
x86 Fix infinite-retry bug 2014-02-04 11:59:16 -06:00
README Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
build.sh Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
midstager.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
single_adduser.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_exec.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_bind_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_bind_tcp_xpfw.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_reverse_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stage_shell.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stage_upexec.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_bind_ipv6_tcp_nx.asm Merge in the IPv6 Teredo patch. 2010-10-04 11:02:46 +00:00
stager_bind_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_bind_tcp_nx.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
stager_find_tag.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_http.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_ipv6_tcp_nx.asm Copyright updates reflecting the news 2009-10-21 12:58:56 +00:00
stager_reverse_ord_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_tcp_nx.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00

README

This directory contains the win32 payload development environment used
for creating the payloads in version 3 of the Metasploit Framework.

The 'nasm' executable must be in your path to use the included build.sh tool.

The included 'build' script automatically creates a number of file types
each time it used to compile a payload. These file types are:

    - Native ELF executable
    - Win32 PE executable
    - Generated C source code
    - Raw opcodes in ".bin" format

The PE executable templates were developed by 'rix' and used with permission.

To use this script, simply run ./build.sh <name of payload>, where the name
does not include the ".asm" suffix. To build win32_stage_api.asm, the 
command line would be "./build.sh win32_stage_api".