- All SYSCALL numbers used in the shellcode are for the latest 3 Windows 10 builds. They all use the same SYSCALL numbers.
- The C file is used to execute the complete shellcode by injecting meterpreter into a process called CrypTool.exe
- If you want a different process, please change the string accordingly in the inline assembly.
- The complete sandwiched shellcode is separated in three chunks to make it easy for you to modify the meterpreter part.
- If your meterpreter code is larger than mine, you need to modify the jmp instruction e9 86 01 00 00 jmp 0x194
- So if your meterpreter size is larger or smaller, change the opcodes to match whether 0x195, 0x193, 0x196 or whatever the beginning of the shellcode.
-
Notifications
You must be signed in to change notification settings - Fork 4
License
nixpal/ProcInjectSyscall
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
No description, website, or topics provided.
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published