Thomas M

Results 7 comments of Thomas M

Thanks for the input!

The loader 1 is essentially a classic process injection called by custom syscall stubs. As shown in the screenshot, in NtAllocVirtualMemory call, it changes the memory protection to RWX therefore...

Where did you run the code from? Make sure ./Boaz has enough permission to save the output file "note_donut" - which is the file that contains the PIC shellcode -...

The LLVM obfuscator build for Boaz has compiled successfully. The issue lies with the unit test in the Wine environment. This should not impact your build. That being said, I...

Hi, Loader-1 has been tested with compiled Notepad and message box code, Mimikatz, and various Meterpreter shells from Metasploit, all working perfectly. Could you send me the source code or...

Use: "python3 Boaz.py -f payload.exe -o payload_ofs.exe -t donut -l 1 -c mingw -e uuid -obf -entropy 1 -a" without "-sgn". The issue lies with the '-sgn' argument; too many...

It definitely supports custom development. You can add a new encoding scheme and template. You just need to ensure it is in C and that you use MinGW-w64 supported libraries...