TextObfs is a little script to assist you in obfuscating strings that will be directly hardcoded in instructions (thus in .text section), which can be useful when writing shellcodes
-
Updated
Apr 12, 2021 - Python
TextObfs is a little script to assist you in obfuscating strings that will be directly hardcoded in instructions (thus in .text section), which can be useful when writing shellcodes
Convert various hex formats such as C-style string/array, raw, swap endianness and more!
Shellcode synthesizer
Load files inside C/C++ code
Custom Language intended for Shellcode Injection and Low-Level / Embedded Scenarios
Glue shellcode extracted from C together with ASM
Lazy "position independent" payload making technique for Windows
A C/C++ project designed to simplify shellcode creation on any compilers using pure C
A C99/C++17 compatible header only library capable of creating position independent shellcode.
Reads an assembly language file, performs two passes over the file to identify labels and assemble the instructions, and then writes the resulting machine code to an output file. It includes several helper functions for handling instructions, managing a hash table for storing labels, and writing the machine code to the output file.
Assignments for SLAE64
x86 shellcodes for windows written in nasm
Shared object ELF injection examples. Bridgehead shellcode for multi-stage payload. Custom Loader tool to inject and run shared objects in a PIE manner
a shellcode to write "y0u sp43k OPC0DE !?" message in an infinite loop
Cyber lab to explore different memory exploits and to analyze malware
Extracts shellcode from any specified binary/object file.
Add a description, image, and links to the shellcode-development topic page so that developers can more easily learn about it.
To associate your repository with the shellcode-development topic, visit your repo's landing page and select "manage topics."