It also starts an multi-handler to receive the remote connection (shell or meterpreter). This tool uses msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh | docm | docx | deb | xml | ps1 | bat | exe | elf | pdf | macho | etc ) then injects the shellcode generated into one template (example: python) "the template then execute the shellcode in RAM" and uses compilers like GCC (gnu cross compiler) mingw32 or pyinstaller.py to build the executable file. ![]() Suspicious-Shell-Activity© (SSA) RedTeam develop Description Distros Supported: Linux Ubuntu, Kali, Debian, BackBox, Parrot OS
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |