metasploit-framework/external/source/shellcode/windows
HD Moore 4971a0d7af Add Skylined's "You Got Pwned" payload
git-svn-id: file:///home/svn/framework3/trunk@11485 4d416f70-5f16-0410-b530-b9f4589650da
2011-01-06 17:34:09 +00:00
..
msf2 removing them 2009-05-20 17:51:45 +00:00
speech Add Skylined's "You Got Pwned" payload 2011-01-06 17:34:09 +00:00
templates Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
x64 Commit the updated APC injection stubs. fixes a nasty issue in some edge cases whereby when using APC injection for a process in another session then the current host process the injected APC can cause an access violation in kernel32 during a call the kernel32!CreateThread caused by the APC's host thread not having an initialized Activation Context inside its TEB. We now test for this and create a dummy ActivationContext entry to appease the kernel. This will both improve DLL injection reliability as well as meterpreter migration reliability. 2010-03-11 17:00:19 +00:00
x86 Two new SNMP community enumeration tools for Windows by tebo (local account list and SMB shares). Addition of a Meterpreter script for snagging the SNMP community from the registry 2010-12-25 06:08:34 +00:00
README Updated README, include the templates and other src 2008-08-22 18:45:33 +00:00
build.sh Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
midstager.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
single_adduser.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_exec.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_bind_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_bind_tcp_xpfw.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
single_shell_reverse_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stage_shell.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stage_upexec.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_bind_ipv6_tcp_nx.asm Merge in the IPv6 Teredo patch. 2010-10-04 11:02:46 +00:00
stager_bind_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_bind_tcp_nx.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00
stager_find_tag.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_http.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_ipv6_tcp_nx.asm Copyright updates reflecting the news 2009-10-21 12:58:56 +00:00
stager_reverse_ord_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_tcp.asm initial import of shellcode source into v3 2007-04-29 20:27:23 +00:00
stager_reverse_tcp_nx.asm Merge Stephen Fewer's patches to enable support for Windows 7 (fixes support for NT and 2000 as well) 2009-07-05 20:24:37 +00:00

README

This directory contains the win32 payload development environment used
for creating the payloads in version 3 of the Metasploit Framework.

The 'nasm' executable must be in your path to use the included build.sh tool.

The included 'build' script automatically creates a number of file types
each time it used to compile a payload. These file types are:

    - Native ELF executable
    - Win32 PE executable
    - Generated C source code
    - Raw opcodes in ".bin" format

The PE executable templates were developed by 'rix' and used with permission.

To use this script, simply run ./build.sh <name of payload>, where the name
does not include the ".asm" suffix. To build win32_stage_api.asm, the 
command line would be "./build.sh win32_stage_api".