You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
# fido
2
2
Teaching an old shellcode new tricks
3
3
4
-
Give fido.py a x86 (32 bit) windows shellcode and it will strip off Stephen Fewer's hash API stub and replace it
4
+
Give fido.py a x86 (32 bit or 64 bit) windows shellcode and it will strip off Stephen Fewer's hash API stub and replace it
5
5
with something that bypasses EMET Caller and EAF+ checks but keeps the actual API calls in use.
6
6
7
7
# WARNING: If the 2nd stage payload uses the hash api from metasploit that loads Win APIs from the Export Address Table and jmp's into them, EMET will catch it.
0 commit comments