• XSS.stack #1 – первый литературный журнал от юзеров форума

RunPE C#??

CompCrime

floppy-диск
Забанен
Регистрация
19.10.2023
Сообщения
4
Реакции
-2
Пожалуйста, обратите внимание, что пользователь заблокирован
Hi,

I am curently working on a crypter.

I didnt found a solution how i could execute PE bytes in the memory, i only found shellcode samples.

Does someone know how to do it, or has a working script that he could give me?

Thx for your answers..
 
Crypter, Nipsy
Sharpsy, Runpee
Humpty, Dumpty
Classform, matterhorn
Grandma, Gramp0rn
Brain dead, eye drops
Pain meds, cyclops
Daybed, iPod
"May-back, " Maybach
Trainwrecks, sidewalks
Payless, high-tops
K-Fed, IHOP
Playtex, icebox
 
what can be discussed on TG, but not here? nobody needs to serve under your lordship, King Arthur! It's rude and counterproductive to encourage discussion on a different platform
 
what can be discussed on TG, but not here? nobody needs to serve under your lordship, King Arthur! It's rude and counterproductive to encourage discussion on a different platform
Hey bro, I have no issue to deal only on XSS :)
I'm new to the forum and do not know how everything is done correctly yet.

Please reconsider <3
 
Hey bro, I have no issue to deal only on XSS :)
I'm new to the forum and do not know how everything is done correctly yet.

Please reconsider <3
https://xss.pro/threads/98325/#post-694205
do yourself a favor and stay as far away as possible from wrappers and libc abominations, or whatever other nigger-rigged workarounds are being suggested
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Is it possible to run PE bytes from the memory in C#? I know how to execute for example shellcode but i cant simply convert a PE into shellcode right? I tried this Donut tool but it dont works with for example a meterpreter EXE, (most Rats dont work).
 
You insist on trying to put a square peg in a round hole instead of listening to what has already been said. I'm not giving you my opinion on the subject. Sharp is good for a few things. Strong support, UI (Forms), error checking and debugging, etc. None of that changes the fact it does not have low level access and anything you write will get reversed with no effort. Do whatever you want though. Enjoy
 
Пожалуйста, обратите внимание, что пользователь заблокирован
If there's a way below pointers- not involving wrappers, p/invoke, etc please share documentation so i can learn, if you don't mind. thank you
 
Пожалуйста, обратите внимание, что пользователь заблокирован
If there's a way below pointers- not involving wrappers, p/invoke, etc please share documentation so i can learn, if you don't mind. thank you
You can pretty much call anything with UnmanagedFunctionPointer delegates, what else would you ever need?
 
meta data, mapping, type-safe, post optimization doesnt make sharp easier to reverse?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
meta data, mapping, type-safe, post optimization doesnt make sharp easier to reverse?
You can pretty much obfuscate everything, even msil code itself can be more easily translated to custom vm or be encrypted using jithook.
 
You can pretty much obfuscate everything, even msil code itself can be more easily translated to custom vm or be encrypted using jithook.
You are a gentleman and a scholar, sir ;-)
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх