mirror of
https://github.com/Answerr/shellcode_loader_bypass.git
synced 2026-02-06 00:21:38 +08:00
Update README.md
This commit is contained in:
@@ -59,8 +59,11 @@ The following bypass techniques are implemented in `bypass1.cpp`:
|
|||||||
**How to Use**
|
**How to Use**
|
||||||
|
|
||||||
1.Generate your raw shellcode as a .bin file using your preferred method.
|
1.Generate your raw shellcode as a .bin file using your preferred method.
|
||||||
|
|
||||||
2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin.
|
2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin.
|
||||||
|
|
||||||
3.Rename output.bin to shellcode.bin and place it in the same directory as the executable.
|
3.Rename output.bin to shellcode.bin and place it in the same directory as the executable.
|
||||||
|
|
||||||
4.Execute the payload.
|
4.Execute the payload.
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user