Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Paulo-D2000/ShellCodeObfuscator
Simple shellcode obfuscator using PYTHON and C / C++
https://github.com/Paulo-D2000/ShellCodeObfuscator
c cpp python3 shellcode shellcode-injection
Last synced: 3 months ago
JSON representation
Simple shellcode obfuscator using PYTHON and C / C++
- Host: GitHub
- URL: https://github.com/Paulo-D2000/ShellCodeObfuscator
- Owner: Paulo-D2000
- Created: 2020-06-17T01:55:49.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-06-17T02:59:31.000Z (over 4 years ago)
- Last Synced: 2024-05-08T01:32:13.892Z (6 months ago)
- Topics: c, cpp, python3, shellcode, shellcode-injection
- Language: C++
- Homepage:
- Size: 28.3 KB
- Stars: 73
- Watchers: 1
- Forks: 17
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - Paulo-D2000/ShellCodeObfuscator - Simple shellcode obfuscator using PYTHON and C / C++ (C++)
README
# ShellCodeObfuscator
*ATENTION! I DON'T RESPONSABILIZE FOR YOUR ACTS, THIS CODE IS ONLY FOR EDUCATIONAL PURPOSES!"
*THIS PROGRAM IS IN DEVELOPMENT! - ONLY TESTED IN WINDOWS 10 X64 BITS*
Simple shellcode obfuscator using PYTHON (and C / C++ for deobfuscation & memory execution) It uses byte shifting to obfuscate the shellcode and run it in the memory.
EXAMPLE: /x21> /xa2 /xf1
USAGE: Change the payload bytes in the file shell_o.py and run it, then paste the output in run.cpp, compile it and run in the target machine.
The deobfuscator is provided in C / C++, just edit it and compile using GCC.
*ADDED DEMO FILES:
shell_o_demo.py
run_demo.cpp
demo.exe
IT SHOWS ONE SIMPLE MESSAGEBOX WHEN YOU RUN demo.exe**PT - BR*
* ATENÇÃO! NÃO RESPONSABILIZO POR SEUS ATOS, ESTE CÓDIGO É APENAS PARA FINS EDUCACIONAIS! "
* ESTE PROGRAMA ESTÁ EM DESENVOLVIMENTO! - SÓ TESTADO NO WINDOWS 10 X64 BITS *
Ofuscador de shellcode simples usando PYTHON (e C / C ++ para desofuscação e execução de memória) Ele usa byte shifting para ofuscar o código de shell e executá-lo na memória.
EXEMPLO: / x21> / xa2 / xf1
USO: Altere os bytes da shellcode no arquivo shell_o.py e execute-o, cole a saída em run.cpp, compile-o e execute-o na máquina de destino.
O desobfuscador é fornecido em C / C ++, basta editá-lo e compilar usando o GCC.
*ADICIONADO AQRUIVOS DE DEMONSTRAÇÃO:
shell_o_demo.py
run_demo.cpp
demo.exe
EXIBE UMA CAIXA DE MENSAGEM AO RODAR O ARQUIVO demo.exe*