I sent a lab product.
Http://bbs.pediy.com/showthread.php? T = 45184
The function is not complete yet. This is the complete version.
It can take off the compressed shell, encrypt the whole shell, and encrypt the shell with the reflection vulnerability.
Method:
The injection method is used to inject to the target process.
After the injection, a list page is displayed.
The List displays allProgramSet.
First, select an assembly to be shelled in the list.
Then select the Save path. (Note 1)
In the case of shelling.
The program uses vs2005 C ++/CLI and requires the relevant Runtime Library mfc80u. dll msvcr80.dll msvcm80.dll...
NOTE 1: The program does not implement the PE dump function. Therefore, you must first use a tool such as petools dump to release the PE module of the assembly and save it to the file. Then select the file when selecting the Save path on the shelling interface.
After the program is removed, use ildasm and ilasm, and then you can use reflector to view the information.
Or you can use dis # to view it after removing it.
:
Http://bbs.pediy.com/showthread.php? T = 47729