Skip to content

Commit

Permalink
Changed shellcode file read mode from binary to non-binary
Browse files Browse the repository at this point in the history
  • Loading branch information
ChrisTruncer committed Apr 16, 2017
1 parent 92cf17b commit 6b48039
Show file tree
Hide file tree
Showing 2 changed files with 6 additions and 1 deletion.
4 changes: 4 additions & 0 deletions CHANGELOG
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
[04.16.2017]
Released.: 3.0.2
Modified.: PowerShell payloads no longer have -Exec bypass and fixed read format from binary to non-binary when reading a file containing shellcode.

[04.04.2017]
Released.: 3.0.1
Modified.: Python rev_https and rev_tcp modified to fix a small bug and formatting issue
Expand Down
3 changes: 2 additions & 1 deletion Tools/Evasion/evasion_common/shellcode_help.py
Original file line number Diff line number Diff line change
Expand Up @@ -201,8 +201,9 @@ def payload_selection_menu(self, showTitle=True):
filePath = input(" [>] Please enter the path to your raw shellcode file: ")

try:
with open(filePath, 'rb') as shellcode_file:
with open(filePath, 'r') as shellcode_file:
file_shellcode = shellcode_file.read()
file_shellcode = file_shellcode.strip()
except:
print(helpers.color(" [!] WARNING: path not found, defaulting to msfvenom!", warning=True))
return None
Expand Down

0 comments on commit 6b48039

Please sign in to comment.