From fd239c7de58ec2ca031fd0f39b95361ca6bdffa5 Mon Sep 17 00:00:00 2001 From: z0noxz Date: Mon, 17 Apr 2017 16:19:20 +0200 Subject: [PATCH] Update powerstager.py --- powerstager/powerstager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/powerstager/powerstager.py b/powerstager/powerstager.py index e144b92..56ac012 100755 --- a/powerstager/powerstager.py +++ b/powerstager/powerstager.py @@ -22,7 +22,7 @@ help_notes = """ This enables the actual payload to be executed indirectly without the victim downloading it, only by executing the stager. The attacker can then for - example implement sandbox evasion on the web server, hosting the payload, + example implement evasion techniques on the web server, hosting the payload, instead of in the stager itself. Additional methods allows the payload to be embedded into the 'stager' and