Сейчас на форуме: bartolomeo, -Sanchez-, morgot, sashalogout (+4 невидимых) |
eXeL@B —› Софт, инструменты —› Windows shellcode emulation tool |
Посл.ответ | Сообщение |
|
Создано: 10 января 2020 03:23 · Поправил: plutos · Личное сообщение · #1 Windows shellcode emulation tool based upon unicorn framework. You can add your custom syscall handlers or any handlers in between the API calls used by shellcode and the kernel layer. This can provide full view of the user stack. It will let you investigate shellcode that bypasses loose API hooks in higher callstack level. ----- Give me a HANDLE and I will move the Earth. |
eXeL@B —› Софт, инструменты —› Windows shellcode emulation tool |