Skip to content
This repository has been archived by the owner on Nov 6, 2023. It is now read-only.

Error create custom shellcode #39

Closed
haokin opened this issue Dec 1, 2018 · 1 comment
Closed

Error create custom shellcode #39

haokin opened this issue Dec 1, 2018 · 1 comment

Comments

@haokin
Copy link

haokin commented Dec 1, 2018

[] choose how to supply shellcode:

[1] Msfvenom

[2] Custom shellcode

[0] Back

[>] Please insert option: 2

[>] Please enter custom shellcode (example: \xff\xbc\xb9\a6 ): \xff

[>] Enter output filename: w

[>] Please insert compiler option (x86 or x64): x86

[>] Encoding step:

[1] None (none)

[2] Multibyte-key xor (good)

[3] Double Multibyte-key xor (excellent)

[4] Triple Multibyte-key xor (excellent)

[>] Please enter options number: 1

[>] Spawn Multiple Processes:

During target-side execution this will cause to spawn a maximum of 4 processes
consequentialy.

Only the last spawned process will reach the malicious section of code
while the other decoy processes spawned before will executes only random junk code
PRO: Longer execution time,Lower rate of detection.

[>] Add multiple processes behaviour?(y/n): n

[>] Generating code...

Traceback (most recent call last):
File "Modules/payloads/ShellcodeInjection_heap_windows.py", line 35, in
SpawnMultiProc = int(sys.argv[1])
ValueError: invalid literal for int() with base 10: ''

@oddcod3
Copy link
Owner

oddcod3 commented Dec 4, 2018

Thank you @haokin !
Solved in update 2.0.1

@oddcod3 oddcod3 closed this as completed Dec 8, 2018
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants