n1nj4sec
a66c52d56e
README updated
2015-09-22 19:26:14 +02:00
n1nj4sec
cae38bd6c7
README updated
2015-09-22 19:26:14 +02:00
n1nj4sec
b6e9655798
README updated
2015-09-22 19:26:14 +02:00
n1nj4sec
83abf224fc
updated README
2015-09-22 19:26:14 +02:00
n1nj4sec
d6be6f470c
Update README.md
2015-09-22 19:26:14 +02:00
n1nj4sec
22805b90b9
screenshots added to README
2015-09-22 19:26:14 +02:00
n1nj4sec
95da9e8469
readme added
2015-09-22 19:26:10 +02:00
n1nj4sec
cb54844b60
first commit :-)
2015-09-22 19:25:36 +02:00
deathfantasy
42249f9564
add option to disable server prompt coloring (dirty hack)
2015-09-22 22:57:55 +07:00
byt3bl33d3r
99e075853f
Revert "Fixed dll payload generation in genpayload.py"
...
This reverts commit c5582dc7ed
.
2015-09-22 14:58:59 +02:00
byt3bl33d3r
3a57c0ef82
New shellcode_exec module, interactive_shell fix, spelling and description fixes
...
Added a shellcode_exec module to execute shellcode
Fixed issue with interactive shell module that would cause a cmd prompt to appear
Misc spelling and description fixes
2015-09-22 14:44:16 +02:00
byt3bl33d3r
f524dd497b
Fixed dll payload generation in genpayload.py
2015-09-22 12:35:47 +02:00
n1nj4sec
c2a3a00988
correction of typo in the README
2015-09-22 08:48:24 +02:00
n1nj4sec
0a425645ed
modified: README
2015-09-21 23:26:47 +02:00
n1nj4sec
a608ecb5f2
README updated
2015-09-21 23:14:21 +02:00
n1nj4sec
90f34df7f4
README updated
2015-09-21 23:12:18 +02:00
n1nj4sec
d5eb3a5b8e
README updated
2015-09-21 23:10:36 +02:00
n1nj4sec
79599c8bb3
updated README
2015-09-21 22:50:01 +02:00
n1nj4sec
8e4cd5354f
Merge branch 'master' of github.com:/n1nj4sec/pupy
2015-09-21 22:46:07 +02:00
n1nj4sec
f506c3a07b
screenshots added to README
2015-09-21 22:44:02 +02:00
n1nj4sec
accd37a9d8
Update README.md
2015-09-21 22:24:27 +02:00
n1nj4sec
4ee67ad279
readme added
2015-09-21 22:15:05 +02:00
n1nj4sec
518a40751f
first commit :-)
2015-09-21 21:53:37 +02:00
n1nj4sec
6994d06ea8
Initial commit
2015-09-21 19:30:54 +02:00