https://github.com/code-barru/deceiver
Quick and dirty shellcode encryptor and obfuscator
https://github.com/code-barru/deceiver
encryption maldev obfuscation rust shellcode
Last synced: 9 months ago
JSON representation
Quick and dirty shellcode encryptor and obfuscator
- Host: GitHub
- URL: https://github.com/code-barru/deceiver
- Owner: Code-Barru
- Created: 2025-02-27T19:54:32.000Z (9 months ago)
- Default Branch: master
- Last Pushed: 2025-03-02T00:40:41.000Z (9 months ago)
- Last Synced: 2025-03-02T01:27:05.949Z (9 months ago)
- Topics: encryption, maldev, obfuscation, rust, shellcode
- Language: Rust
- Homepage:
- Size: 14.6 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README

## Description
> [!note]
> This project is inspired by [NUL0x4C's HellShell](https://github.com/NUL0x4C/HellShell)
The goal of the project is to encrypt or obfuscate a payload, then generate a `.rs` file that contains the required functions to decrypt or deobfuscate the payload.
Deceiver takes padding into account, using [pkcs#7](https://en.wikipedia.org/wiki/PKCS_7) padding to adapt to every length of payload.
Deceiver will output the generated `.rs` file to a default `output.rs`.
## Installation
First, you need to have git and rust installed.
Then simply clone the project and run it with cargo.
```shell
git clone https://github.com/Code-Barru/deceiver.git
cd deceiver
cargo run --release --
```
By using cargo the first run will compile the project and therefore take some time. Subsequent uses will be instant.
## Usage
```shell
Usage: deceiver [OPTIONS] [KEY]
Arguments:
The shellcode to encrypt and obfuscate
[KEY] The key to encrypt the shellcode (path or 32 hexa char)
Options:
--encryption Encryption method [aes, rc6, xor]
--obfuscation Obfuscation method [ipv4, ipv6, uuid, mac_addr]
-o, --output The output file [default: output.rs]
-h, --help Print help
-V, --version Print version
```