We have just released the latest version of Nabuware Network Exploit, 2023.2.1, which is a maintenance update aimed at improving the internal architecture of the software.
This update unifies the way the implant accesses processes, addressing a previous issue where some process-related tools would prematurely stop attempting to access the process. The update also resolves an edge case that previously caused the Processes tab to lose the process list after using the injecting tool.
Additionally, support has been added for retrieving objects' mandatory integrity control policy, which is now displayed by the *-permissions
tools.
Two new public functions, processes.suspend_thread(pid: int, tid: int)
and processes.resume_thread(pid: int, tid: int)
, have been added to allow for suspending and resuming threads from within a script.
One of the most visible changes in this update is the introduction of a new per-call security context mechanism. This mechanism allows multiple operators to work within different security contexts without affecting each other. For example, if one operator decides to impersonate SYSTEM, this will not affect any other operators.
If you have any questions or want to purchase a Network Exploit, don't hesitate to contact us on the form below.
Are you looking to purchase Network Exploit, or do you have any questions?