mirror of
https://github.com/Answerr/shellcode_loader_bypass.git
synced 2026-02-06 00:21:38 +08:00
Update README.md
This commit is contained in:
@@ -58,10 +58,10 @@ The following bypass techniques are implemented in `bypass1.cpp`:
|
||||
|
||||
**How to Use**
|
||||
|
||||
1.Generate your raw shellcode as a .bin file using your preferred method.
|
||||
2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin.
|
||||
3.Rename output.bin to shellcode.bin and place it in the same directory as the executable.
|
||||
4.Execute the payload.
|
||||
1.Generate your raw shellcode as a .bin file using your preferred method.
|
||||
2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin.
|
||||
3.Rename output.bin to shellcode.bin and place it in the same directory as the executable.
|
||||
4.Execute the payload.
|
||||
|
||||
|
||||
---
|
||||
|
||||
Reference in New Issue
Block a user