Metasploit mailing list archives

Re: Encoding a payload within an exploit


From: danuxx () gmail com
Date: Sat, 18 Sep 2010 03:29:36 +0000

I went through the same issue, so I created a tool which identifies the signature being detected by the AV and encode 
it on disk and decode it on memory, I will release that tool in two weeks, it works for any AV on a 32 bit windows 
system.

I will post the open source tool in this and all security mailing list so that you can enjoy it.

Stay tuned!!

Sent via BlackBerry from Danux Network

-----Original Message-----
From: John Nash <rootsecurityfreak () gmail com>
Sender: framework-bounces () spool metasploit com
Date: Sat, 18 Sep 2010 06:58:15 
To: <egypt () metasploit com>
Cc: <framework () spool metasploit com>
Subject: Re: [framework] Encoding a payload within an exploit

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


Current thread: