@Quenty.
No, that code is used for exploiting, so you can run scripts in any place. I saw source of one similar exploit, and it had same code, that it injects in memory.
Also, he gave the address, so you could probably edit old exploit software, and use this new address. Thought I am not great at this stuff, so I won't be able to find what to change. |