You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 6, 2023. It is now read-only.
[>] Please enter custom shellcode (example: \xff\xbc\xb9\a6 ): \xff
[>] Enter output filename: w
[>] Please insert compiler option (x86 or x64): x86
[>] Encoding step:
[1] None (none)
[2] Multibyte-key xor (good)
[3] Double Multibyte-key xor (excellent)
[4] Triple Multibyte-key xor (excellent)
[>] Please enter options number: 1
[>] Spawn Multiple Processes:
During target-side execution this will cause to spawn a maximum of 4 processes
consequentialy.
Only the last spawned process will reach the malicious section of code
while the other decoy processes spawned before will executes only random junk code
PRO: Longer execution time,Lower rate of detection.
[>] Add multiple processes behaviour?(y/n): n
[>] Generating code...
Traceback (most recent call last):
File "Modules/payloads/ShellcodeInjection_heap_windows.py", line 35, in
SpawnMultiProc = int(sys.argv[1])
ValueError: invalid literal for int() with base 10: ''
The text was updated successfully, but these errors were encountered:
[] choose how to supply shellcode:
[1] Msfvenom
[2] Custom shellcode
[0] Back
[>] Please insert option: 2
[>] Please enter custom shellcode (example: \xff\xbc\xb9\a6 ): \xff
[>] Enter output filename: w
[>] Please insert compiler option (x86 or x64): x86
[>] Encoding step:
[1] None (none)
[2] Multibyte-key xor (good)
[3] Double Multibyte-key xor (excellent)
[4] Triple Multibyte-key xor (excellent)
[>] Please enter options number: 1
[>] Spawn Multiple Processes:
During target-side execution this will cause to spawn a maximum of 4 processes
consequentialy.
Only the last spawned process will reach the malicious section of code
while the other decoy processes spawned before will executes only random junk code
PRO: Longer execution time,Lower rate of detection.
[>] Add multiple processes behaviour?(y/n): n
[>] Generating code...
Traceback (most recent call last):
File "Modules/payloads/ShellcodeInjection_heap_windows.py", line 35, in
SpawnMultiProc = int(sys.argv[1])
ValueError: invalid literal for int() with base 10: ''
The text was updated successfully, but these errors were encountered: