mirror of
https://github.com/Answerr/shellcode_loader_bypass.git
synced 2026-02-05 16:19:43 +08:00
Update README.md
This commit is contained in:
@@ -58,10 +58,11 @@ The following bypass techniques are implemented in `bypass1.cpp`:
|
|||||||
|
|
||||||
**How to Use**
|
**How to Use**
|
||||||
|
|
||||||
Generate your raw shellcode as a .bin file using your preferred method.
|
1.Generate your raw shellcode as a .bin file using your preferred method.
|
||||||
Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin.
|
2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin.
|
||||||
Rename output.bin to shellcode.bin and place it in the same directory as the executable.
|
3.Rename output.bin to shellcode.bin and place it in the same directory as the executable.
|
||||||
Execute the payload.
|
4.Execute the payload.
|
||||||
|
|
||||||
|
|
||||||
---
|
---
|
||||||
## Shellcode Loader Bypass Images
|
## Shellcode Loader Bypass Images
|
||||||
|
|||||||
Reference in New Issue
Block a user