Version 2.4
New features:
X- Summary: the 64bit payloads are FUD, the payloads in 32bit I have several ideas to make them undetectable but if you have some I am a taker.
1- Code fully reviewed and redrafted.
2- 32bit payloads can now be executed in remote processes.
3- Junkcode injector reviewed.
4- The xor encryption stub has changed.
5- Added UPX packer.
6- Enhanced escape module.
7- You can now get a hash of your payload (MD5/SHA256).
8- New injection method (Thread Hijacking).
9- Deleted post-processing module.
I have lots of feature ideas coming soon, but I'd like to do it cleanly so I'm taking my time.
I sent the update to show that I still maintain MsfMania, with undetectable 64bit payloads and soon the 32bit.
There will certainly be payloads other than Executable Laptops, I would like to diversify.
Powershell payloads, Metasploit scripts, and so on.
Don't hesitate to give me ideas!
GitHub - lepotekil/MsfMania: Python AV Evasion Tools
Python AV Evasion Tools. Contribute to lepotekil/MsfMania development by creating an account on GitHub.