View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0003254 | Kali Linux | New Tool Requests | public | 2016-04-25 12:19 | 2020-02-11 16:03 |
Reporter | bmerinofe | Assigned To | |||
Priority | normal | Severity | feature | Reproducibility | always |
Status | closed | Resolution | won't fix | ||
Summary | 0003254: Pazuzu - reflective DLL to run binaries from memory | ||||
Description | Pazuzu is a Python script that allows you to embed a binary within a precompiled DLL which uses reflective DLL injection. The goal is that you can run your own binary directly from memory. To run the payload, you just have to choose the stager you like (reverse TCP, HTTP, HTTPS, etc.) and set the DLL generated by Pazuzu. Pazuzu will execute the binary within the address space of the vulnerable process as long as it has the .reloc section. | ||||
Additional Information | More info: Some practical examples: Git Repository: | ||||
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):
|
|
Looks like python2 - which is EOL |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2016-04-25 12:19 | bmerinofe | New Issue | |
2018-01-29 15:08 | g0tmi1k | Note Added: 0008448 | |
2018-05-08 08:41 | g0tmi1k | Summary | Pazuzu: reflective DLL to run binaries from memory => Pazuzu - reflective DLL to run binaries from memory |
2018-05-08 08:41 | g0tmi1k | Steps to Reproduce Updated | |
2019-12-09 13:30 | g0tmi1k | Severity | minor => feature |
2020-02-11 16:03 | g0tmi1k | Note Added: 0012236 | |
2020-02-11 16:03 | g0tmi1k | Status | new => closed |
2020-02-11 16:03 | g0tmi1k | Resolution | open => won't fix |