metasploit-loader | A client compatible with Metasploit 's staging protocol
kandi X-RAY | metasploit-loader Summary
kandi X-RAY | metasploit-loader Summary
A quick stager client compatible with the Metasploit Framework.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of metasploit-loader
metasploit-loader Key Features
metasploit-loader Examples and Code Snippets
Community Discussions
Trending Discussions on metasploit-loader
QUESTION
I'm working on a project that i need to load a simple exe
file to a buffer and then call the entry point of the exe
file from within the ram .
i know that i can't load and run a very complicated exe file with a lot of dependencies from buffer but i think its possible to call an independent function of the exe (PE)
file (like an empty main).
to do so,i have to find the entry point address of exe file (its offset) and then cast that address (which is now loaded in a buffer) to a pointer-to-function and then call that, it probably would call the function loaded in ram but i don't know how to find the address .
this is what I've done so far :
...ANSWER
Answered 2017-Jan-02 at 19:55Chances are you are probably tring to solve the wrong problem. If you are using an operating system (say Windows or Linux), then the simplest thing to do is just call the system
function, i.e.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install metasploit-loader
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page