Pārlūkot izejas kodu

Update DirectSyscalls.sh

assume-breach 2 gadi atpakaļ
vecāks
revīzija
bfca0063b0
1 mainītis faili ar 1 papildinājumiem un 1 dzēšanām
  1. 1 1
      Harriet/Harriet/DirectSyscalls/DirectSyscalls.sh

+ 1 - 1
Harriet/Harriet/DirectSyscalls/DirectSyscalls.sh

@@ -98,7 +98,7 @@ sed -i "s/Random9/$Random9/g" Harriet/DirectSyscalls/Resources/template.cpp
 
 
 echo -e ${yellow}"+++Compiling Malware+++"${clear}
-x86_64-w64-mingw32-g++ -o $MALWARE Harriet/DirectSyscalls/Resources/template.cpp -I/usr/share/mingw-w64/include/ -s -ffunction-sections -fdata-sections -Wno-write-strings -fno-exceptions -fmerge-all-constants -static-libstdc++ -static-libgcc -fpermissive -lntdll -Wno-narrowing -O2 -O3 -Os>/dev/null 2>&1
+x86_64-w64-mingw32-g++ -o $MALWARE Harriet/DirectSyscalls/Resources/template.cpp -I/usr/share/mingw-w64/include/ -s -ffunction-sections -fdata-sections -Wno-write-strings -fno-exceptions -fmerge-all-constants -static-libstdc++ -static-libgcc -fpermissive -lntdll -Wno-narrowing -O2 >/dev/null 2>&1
 echo ""
 sleep 2
 rm shell*