mirror of
https://github.com/Answerr/shellcode_loader_bypass.git
synced 2026-02-05 16:19:43 +08:00
Update README.md
This commit is contained in:
11
README.md
11
README.md
@@ -58,10 +58,13 @@ The following bypass techniques are implemented in `bypass1.cpp`:
|
||||
|
||||
**How to Use**
|
||||
|
||||
1.Generate your raw shellcode as a .bin file using your preferred method.
|
||||
2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin.
|
||||
3.Rename output.bin to shellcode.bin and place it in the same directory as the executable.
|
||||
4.Execute the payload.
|
||||
1.Generate your raw shellcode as a .bin file using your preferred method.
|
||||
|
||||
2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin.
|
||||
|
||||
3.Rename output.bin to shellcode.bin and place it in the same directory as the executable.
|
||||
|
||||
4.Execute the payload.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Reference in New Issue
Block a user