Metasploit mailing list archives
Re: Encoding a payload within an exploit
From: John Nash <rootsecurityfreak () gmail com>
Date: Sun, 19 Sep 2010 07:08:38 +0530
sounds great!!! :) On Sat, Sep 18, 2010 at 8:59 AM, <danuxx () gmail com> wrote:
I went through the same issue, so I created a tool which identifies the signature being detected by the AV and encode it on disk and decode it on memory, I will release that tool in two weeks, it works for any AV on a 32 bit windows system. I will post the open source tool in this and all security mailing list so that you can enjoy it. Stay tuned!! Sent via BlackBerry from Danux Network -----Original Message----- From: John Nash <rootsecurityfreak () gmail com> Sender: framework-bounces () spool metasploit com Date: Sat, 18 Sep 2010 06:58:15 To: <egypt () metasploit com> Cc: <framework () spool metasploit com> Subject: Re: [framework] Encoding a payload within an exploit _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- Encoding a payload within an exploit John Nash (Sep 17)
- Re: Encoding a payload within an exploit John Nash (Sep 17)
- Re: Encoding a payload within an exploit egypt (Sep 17)
- Re: Encoding a payload within an exploit John Nash (Sep 17)
- Re: Encoding a payload within an exploit danuxx (Sep 17)
- Re: Encoding a payload within an exploit John Nash (Sep 18)
- Re: Encoding a payload within an exploit egypt (Sep 17)
- Re: Encoding a payload within an exploit John Nash (Sep 17)