Now binaries are automatically encrypted and stored in memory, so they don't need to be sent each time. Have fun! https://github.com/fortra/No-Consolation/commit/1a138b8fa57b5616ae358240787b05276019ad05
🔥 Big update!
Nanodump now supports the PPLMedic exploit!
https://github.com/fortra/nanodump
Also, several improvement where made to the SSP module, which should be a lot easier to use now
Needless to say, all the credit goes to @itm4n for his amazing work and research.
"Bypassing PPL in Userland (again)"
Over the past 6 months, I worked on a new Userland exploit for injecting unsigned code in a PPL. In this new blog post, I discuss my methodology and all the issues I had to solve to achieve this result.
https://blog.scrt.ch/2023/03/17/bypassing-ppl-in-userland-again/
I just published my Implementation of call stack spoofing using hardware breakpoints :)
Works for syscalls and APIs, supports x64, x86 and WoW64.
https://www.coresecurity.com/blog/hardware-call-stack
It comes with a robust x64 stack unwinding Implementation, supporting all opcodes, as well as some interesting edge cases.
Gives you total control over the stack layout.
https://github.com/fortra/hw-call-stack