Skip to content

Conversation

dledda-r7
Copy link
Contributor

This PR updates the exe generation of exe-service templates to support larger payloads, such as stageless payloads.

@smcintyre-r7 smcintyre-r7 self-assigned this Aug 28, 2025
@smcintyre-r7 smcintyre-r7 moved this from Todo to In Progress in Metasploit Kanban Aug 28, 2025
@smcintyre-r7 smcintyre-r7 moved this from In Progress to Todo in Metasploit Kanban Aug 28, 2025
@dledda-r7 dledda-r7 force-pushed the fix/update-exe-service-templates branch from 1f1c60f to 1696ff6 Compare September 16, 2025 14:47
@dledda-r7
Copy link
Contributor Author

@zeroSteiner, I have spotted an issue while working. There is something called: EXE::Inject which is a flag used to use the SegmentInjector instead of the SegmentAppender. the difference betweem them is that the injector is able to execute the payload from the section (same way as the other, by modifying the entry point). but then jumps back to the original entry point to continue the execution. i have tested with the payload windows/x64/meterpreter/reverse_tcp and is not swapping the "PAYLOD:" marker with valid opcode, so probably after jumping back the original entrypoint the thread would crash badly.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Todo
Development

Successfully merging this pull request may close these issues.

2 participants