From d60cd1d80ff016f37cae69e6cf881f8acdb75ea8 Mon Sep 17 00:00:00 2001 From: 0xZon <52760493+0xZon@users.noreply.github.com> Date: Tue, 15 Oct 2024 00:04:58 -0600 Subject: [PATCH] Added startDll() --- Server/Modules/pythonmemorymodule.py | 1 + 1 file changed, 1 insertion(+) diff --git a/Server/Modules/pythonmemorymodule.py b/Server/Modules/pythonmemorymodule.py index 76ea6ac..e6b0cdd 100644 --- a/Server/Modules/pythonmemorymodule.py +++ b/Server/Modules/pythonmemorymodule.py @@ -382,6 +382,7 @@ def hook_routine(fileName,zip_web): if not (inject_exe): print("[*] Calling " + dll_procedure + " procedure.") startDll = dll.get_proc_addr(dll_procedure) + startDll() # this keeps python.exe opened while dll is executing print("[*] Press Ctrl+C to end loop - Warning! this will end your routine and free the dll loaded.")