Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mhaskar/Shellcode-In-Memory-Decoder
A simple C implementation to decoded your shellcode and writes it directly to memory
https://github.com/mhaskar/Shellcode-In-Memory-Decoder
Last synced: 3 months ago
JSON representation
A simple C implementation to decoded your shellcode and writes it directly to memory
- Host: GitHub
- URL: https://github.com/mhaskar/Shellcode-In-Memory-Decoder
- Owner: mhaskar
- License: gpl-3.0
- Created: 2020-07-10T21:54:14.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2020-07-10T22:34:21.000Z (over 4 years ago)
- Last Synced: 2024-05-01T16:23:12.152Z (6 months ago)
- Language: C
- Size: 1.24 MB
- Stars: 94
- Watchers: 6
- Forks: 29
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - mhaskar/Shellcode-In-Memory-Decoder - A simple C implementation to decoded your shellcode and writes it directly to memory (C)
README
# Shellcode-In-Memory-Decoder
A simple C implementation to decoded your shellcode and writes it directly to memory, You can use this code to perform process injection.
# Usage
You need to encode your shellcode first, the file `xor-encoder.py` is a very simple example of how you can encode your shellcode using XOR.
Then you need to copy the output of `xor-encoder.py` and paste it into `shellcode` array in the file `decoder.c`.
To compile the code from Linux you can use `Mingw64` Like the following:
`x86_64-w64-mingw32-gcc decoder.c -o decoder.exe -w`
After that, you can run it in the target machine and pass the PID like the following:
`C:\Users\askar\Desktop>decoder.exe 3796`
![Run Decoder](Decoder-example.png)
And after we run it, we will get the following nice beacon:
![GitHub Logo](Cobalt-Beacon.png)