You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I too am greatly interested in this project as well as AntiPwny (by Rohan Vazarkar and David Bitner).
I wanted to give you guys the heads up that I have asked a similar question about this signature over at rvazarkar/antipwny#3
It appears that Meterpreter_Payload_Defense took the original signature, shortened the hex to omit the "0x" portion, and encoded it as base64. The original signature from Rohan Vazarkar and David Bitner doesn't have much in the way of comments or background information either. It would be interesting to know where it came from so we could possibly hone it in, or extend it to detect other injected payloads as well.
Not a issue, just a question... What exactly is that a signature of ???
Also the ability to dump the memory would make a nifty feature.
Cheers and Awesome work!!!
The text was updated successfully, but these errors were encountered: