Skip to content
This repository has been archived by the owner on Aug 18, 2023. It is now read-only.

Commit

Permalink
Patch 1.4
Browse files Browse the repository at this point in the history
  • Loading branch information
Tylous authored Mar 16, 2021
1 parent a66f32f commit 559b64a
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion ScareCrow.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ func options() *FlagOptions {
outFile := flag.String("O", "", "Name of output file (e.g. loader.js or loader.hta). If Loader is set to dll or binary this option is not required.")
inputFile := flag.String("I", "", "Path to the raw 64-bit shellcode.")
console := flag.Bool("console", false, "Only for Binary Payloads - Generates verbose console information when the payload is executed. This will disable the hidden window feature.")
LoaderType := flag.String("Loader", "control", `Sets the type of process that will sideload the malicious payload:
LoaderType := flag.String("Loader", "binary", `Sets the type of process that will sideload the malicious payload:
[*] binary - Generates a binary based payload. (This type does not benfit from any sideloading)
[*] control - Loads a hidden control applet - the process name would be rundll32 if -O is specified a JScript loader will be generated.
[*] dll - Generates just a DLL file. Can executed with commands such as rundll32 or regsvr32 with DllRegisterServer, DllGetClassObject as export functions.
Expand Down

0 comments on commit 559b64a

Please sign in to comment.