View Issue Details
ID | Project | Category | View Status | Date Submitted | Last Update |
---|---|---|---|---|---|
0000655 | Kali Linux | Queued Tool Addition | public | 2013-10-18 17:48 | 2021-05-18 11:02 |
Reporter | midnite_runr | Assigned To | dookie | ||
Priority | normal | Severity | minor | Reproducibility | N/A |
Status | resolved | Resolution | fixed | ||
Platform | All | OS | All | OS Version | All |
Fixed in Version | 1.0.6 | ||||
Summary | 0000655: Add the Backdoor Factory to the tool repository [Please] | ||||
Description | The Backdoor Factory, a python script, injects shellcode into win32/64 PE files, to continue normal file execution (if the shellcode supports it), by patching the exe/dll directly. https://github.com/secretsquirrel/the-backdoor-factory Video: http://www.youtube.com/watch?v=jXLb2RNX5xs Injection Module Demo: http://www.youtube.com/watch?v=04aJAex2o3U Slides: http://www.slideshare.net/midnite_runr/patching-windows-executables-with-the-backdoor-factory | ||||
Is the tool useful / functional in a Penetration Testing environment? Does the tool contain functionality of other existing tools? Does the licensing of the tool allow for free re-distribution? How much resources does the tool require? Will it work in a “standard” environment? |
|
Added in backdoor-factory_1.0+git20131021-1kali0. FYI, the tool has been renamed to backdoor-factory. Thanks for the suggestion! |
|
Date Modified | Username | Field | Change |
---|---|---|---|
2013-10-18 17:48 | midnite_runr | New Issue | |
2013-10-18 18:56 | midnite_runr | Note Added: 0001028 | |
2013-10-21 17:20 | dookie | Assigned To | => dookie |
2013-10-21 17:20 | dookie | Status | new => assigned |
2013-10-21 19:05 | dookie | Note Added: 0001036 | |
2013-10-21 19:05 | dookie | Status | assigned => resolved |
2013-10-21 19:05 | dookie | Fixed in Version | => 1.0.6 |
2013-10-21 19:05 | dookie | Resolution | open => fixed |
2013-12-06 16:24 |
|
Issue cloned: 0000738 | |
2021-05-18 11:02 | g0tmi1k | Category | New Tool Requests => Queued Tool Addition |