module
HTTPS Fetch, Windows shellcode stage, Bind TCP Stager (RC4 Stage Encryption, Metasm)
| Disclosed |
|---|
| N/A |
Disclosed
N/A
Description
Fetch and execute an x64 payload from an HTTPS server.
Custom shellcode stage.
Connect back to the attacker
Custom shellcode stage.
Connect back to the attacker
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.