Skip to content

Commit

Permalink
RC2 060
Browse files Browse the repository at this point in the history
  • Loading branch information
psycore8 committed Nov 30, 2024
1 parent 1aeaa9c commit 18f281a
Show file tree
Hide file tree
Showing 4 changed files with 8 additions and 5 deletions.
7 changes: 4 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
# ShenCode

A multi purpose tool for shellcode operations.
**A versatile tool for working with shellcodes.**

![](shencode-060.png)

![](shencode-051.png)
## Features

### Version 0.6.0
Expand All @@ -15,7 +15,7 @@ A multi purpose tool for shellcode operations.
- `msfvenom` - [create payloads](https://github.com/psycore8/shencode/wiki/msfvenom) with msfvenom
- encoder
- `aesenc` - [Encrypt](https://github.com/psycore8/shencode/wiki/aesenc) payload with AES
- `byteswap` - New XOR Encryption, Swapping Bytes ([Blog Post](https://www.nosociety.de/en:it-security:blog:obfuscation_byteswapping))
- `byteswap` - New XOR Encryption, [Swapping Bytes](https://github.com/psycore8/shencode/wiki/byteswap) ([Blog Post](https://www.nosociety.de/en:it-security:blog:obfuscation_byteswapping))
- `xorenc` - [Encode payload](https://github.com/psycore8/shencode/wiki/xorenc) with custom XOR key
- `xorpoly` - [polymorphic x64](https://github.com/psycore8/shencode/wiki/xorpoly) in-memory decoder (for details, visit this [Blog Post](https://www.nosociety.de/en:it-security:blog:obfuscation_polymorphic_in_memory_decoder))
- obfuscator
Expand All @@ -28,6 +28,7 @@ A multi purpose tool for shellcode operations.
#### Improvements

- `byteswap` - New XOR Encryption, Swapping Bytes
- `core` - Tested on Linux and Windows
- `core` - Output optimizations
- `core` - Better class implementations
- `core` - Fixed Linux import error
Expand Down
Binary file removed shencode-051.png
Binary file not shown.
Binary file added shencode-060.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
6 changes: 4 additions & 2 deletions shencode.py
Original file line number Diff line number Diff line change
Expand Up @@ -22,8 +22,10 @@
# make sure your metasploit binary folder is in your PATH variable
if os.name == 'nt':
msfvenom_path = "msfvenom.bat"
tpl_path = 'tpl\\'
elif os.name == 'posix':
msfvenom_path = 'msfvenom'
tpl_path = 'tpl/'

def main(command_line=None):
print(f"{nstate.HEADER}")
Expand Down Expand Up @@ -70,7 +72,7 @@ def main(command_line=None):
cs.CreateShellcodeEx(msfvenom_path)

elif arguments.command == 'xorpoly':
poly = xorpoly.xor(arguments.input, arguments.output, b'', b'', 'tpl\\xor-stub.tpl', arguments.key)
poly = xorpoly.xor(arguments.input, arguments.output, b'', b'', f'{tpl_path}xor-stub.tpl', arguments.key)
xor_enc = xor.xor_encoder('', '', 0)
filecheck, outstrings = FileCheck.CheckSourceFile(poly.input_file, 'XOR-POLY')
for string in outstrings:
Expand All @@ -87,7 +89,7 @@ def main(command_line=None):
print(f'{string}')

elif arguments.command == 'byteswap':
swapper = byteswap.xor(arguments.input, arguments.output, 'tpl\\byteswap-short.tpl', arguments.key)
swapper = byteswap.xor(arguments.input, arguments.output, f'{tpl_path}byteswap-short.tpl', arguments.key)
filecheck, outstrings = FileCheck.CheckSourceFile(swapper.input_file, 'XOR-SWAP')
for string in outstrings:
print(f'{string}')
Expand Down

0 comments on commit 18f281a

Please sign in to comment.