module

HTTPS Fetch, Windows shellcode stage, Bind TCP Stager (RC4 Stage Encryption, Metasm)

Disclosed
N/A

Description

Fetch and execute an x64 payload from an HTTPS server.
Custom shellcode stage.

Connect back to the attacker
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.