@@ -186,7 +186,7 @@ Output::
186186
187187Output::
188188
189- (cmd λ) python.exe network.py
189+ (cmd λ) python.exe network\network .py
190190 Working on ipv4
191191 == Listening ==
192192 Some listening connections: [<TCP IPV4 Listening socket on 0.0.0.0:80>, <TCP IPV4 Listening socket on 0.0.0.0:135>, <TCP IPV4 Listening socket on 0.0.0.0:443>]
@@ -413,7 +413,7 @@ Ouput::
413413
414414Ouput::
415415
416- (cmd λ) python.exe debug\debug\ attach.py
416+ (cmd λ) python.exe debug\attach.py
417417 Finding process with pid <11392>
418418 Target is <WinProcess "notepad.exe" pid 11392 at 0x471a750>
419419 Debugger attached: <windows.debug.debugger.Debugger object at 0x04707EF0>
@@ -441,7 +441,7 @@ Native code tester
441441
442442Ouput::
443443
444- (cmd λ) python.exe .\samples\ test_code.py "mov eax, 0x42424242" "eax=0x11223344"
444+ (cmd λ) python.exe test_code.py "mov eax, 0x42424242" "eax=0x11223344"
445445 Testing x86 code
446446 Startup context is:
447447 Eip -> 0x3f0000L
@@ -473,7 +473,7 @@ Ouput::
473473 Eax: 0x11223344 -> 0x42424242 (+0x31200efe)
474474
475475
476- (cmd λ) python64 .\samples\ test_code.py --x64 "mov r15, 0x11223344; push r14; call r15" "rcx=1; r14=0x4242424243434343"
476+ (cmd λ) python64 test_code.py --x64 "mov r15, 0x11223344; push r14; call r15" "rcx=1; r14=0x4242424243434343"
477477 Testing x64 code
478478 Startup context is:
479479 Rip -> 0x205a1d60000L
@@ -720,7 +720,7 @@ Ouput::
720720 Found it !
721721
722722 == PE Analysis ==
723- Target sha1 = <059cb1ba1a41433a18dd8f87422c2ac3bf35b7b8 >
723+ Target sha1 = <eb90bc0e33f3e62b0eac4afa8bfcf42a5d4e7bbb >
724724 Analysing <CryptObject "C:\windows\system32\ntdll.dll" content_type=CERT_QUERY_CONTENT_PKCS7_SIGNED_EMBED(0xaL)>
725725 File has 1 signer(s):
726726 Signer 0:
@@ -866,7 +866,7 @@ Manual UAC
866866
867867Output::
868868
869- (cmd λ) python samples\ rpc\uac.py
869+ (cmd λ) python rpc\uac.py
870870 Namespace(cmdline='', creationflags=CREATE_UNICODE_ENVIRONMENT(0x400L), target='C:\\Python27\\python.exe', uacflags=17)
871871 # UAC pop - asking to execute python.exe | Clicking Yes
872872 Return value = 0x6
@@ -890,7 +890,7 @@ Manual ``LsarEnumeratePrivileges``
890890
891891Output::
892892
893- (cmd λ) python samples\ rpc\lsass.py
893+ (cmd λ) python rpc\lsass.py
894894 (2, u'SeCreateTokenPrivilege')
895895 (3, u'SeAssignPrimaryTokenPrivilege')
896896 (4, u'SeLockMemoryPrivilege')
0 commit comments