|
@@ -1,5 +1,7 @@
|
|
|
# InjectPoolParty
|
|
# InjectPoolParty
|
|
|
-Inject listener shellcode in a specified process and execute it via [Windows Thread Pools](https://github.com/SafeBreach-Labs/PoolParty/). The following execution variants are supported: TP_TIMER (variant 8) | TP_DIRECT (variant 7) | TP_WORK (variant 2). The following beacon shellcode configuration is injected: x64, process, indirect. This can be changed in the .cna script.
|
|
|
|
|
|
|
+Inject listener shellcode in a specified process and execute it via [Windows Thread Pools](https://github.com/SafeBreach-Labs/PoolParty/). The following execution variants are supported: TP_TIMER (variant 8) | TP_DIRECT (variant 7) | TP_WORK (variant 2).
|
|
|
|
|
+
|
|
|
|
|
+>The following beacon shellcode configuration is injected: x64, process, indirect. This can be changed in the .cna script.
|
|
|
|
|
|
|
|
## Arguments
|
|
## Arguments
|
|
|
* `<variant>`: Windows Thread Pool execution variant: `TP_TIMER` | `TP_DIRECT` | `TP_WORK` (susceptible to slow execution time).
|
|
* `<variant>`: Windows Thread Pool execution variant: `TP_TIMER` | `TP_DIRECT` | `TP_WORK` (susceptible to slow execution time).
|