metasploit-framework
https://github.com/rapid7/metasploit-framework
Ruby
Metasploit Framework
Rex::Payloads::Win32::Kernel::Stager._run_only_in_win32proc_stub
This stub is used by stagers to check to see if the code is running in the context of a user-mode system process. By default, this process is lsass.exe. If it isn't, it runs the code specified by append. Otherwise, it jumps past that code and into what should be the expected r3 payload to execute. This stub also makes sure that the payload does not run more than once.
Edit
git clone [email protected]:rapid7/metasploit-framework.git
cd metasploit-framework
open lib/rex/payloads/win32/kernel/stager.rb
Contribute
# Make a new branchgit checkout -b -your-name--update-docs-Rex--Payloads--Win32--Kernel--Stager-_run_only_in_win32proc_stub-for-pr
# Commit to gitgit add lib/rex/payloads/win32/kernel/stager.rbgit commit -m "better docs for Rex::Payloads::Win32::Kernel::Stager._run_only_in_win32proc_stub"
# Open pull requestgem install hub # on a mac you can `brew install hub`
hub fork
git push <your name> -your-name--update-docs-Rex--Payloads--Win32--Kernel--Stager-_run_only_in_win32proc_stub-for-pr
hub pull-request
# Celebrate!