Metasploit mailing list archives

Re: Encoding a payload within an exploit


From: John Nash <rootsecurityfreak () gmail com>
Date: Sun, 19 Sep 2010 07:08:38 +0530

sounds great!!! :)

On Sat, Sep 18, 2010 at 8:59 AM, <danuxx () gmail com> wrote:

I went through the same issue, so I created a tool which identifies the
signature being detected by the AV and encode it on disk and decode it on
memory, I will release that tool in two weeks, it works for any AV on a 32
bit windows system.

I will post the open source tool in this and all security mailing list so
that you can enjoy it.

Stay tuned!!

Sent via BlackBerry from Danux Network

-----Original Message-----
From: John Nash <rootsecurityfreak () gmail com>
Sender: framework-bounces () spool metasploit com
Date: Sat, 18 Sep 2010 06:58:15
To: <egypt () metasploit com>
Cc: <framework () spool metasploit com>
Subject: Re: [framework] Encoding a payload within an exploit

_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework



_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: