Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Shellcoder.py - simple script to automate shellcoding process and shellcode testing.

NotificationsYou must be signed in to change notification settings

Print3M/shellcoder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Write your shellcode in Assembly (NASM) and compile it on Windows x64 with one command!

This script helps automate the shellcode development and testing process. It takes your Assembly file with the payload (shellcode.asm) and generates a bunch of useful executable files (read below).

You don't have to repeat all these tedious activities anymore to make your shellcode executable! Keep your focus on shellcoding 🔥🐚🔥

Installation

The following software must be installed on your system:

No Python dependencies are necessary! You are ready to go.

Usage

  1. Write your shellcode inshellcode.asm
  2. Runpython shellcoder.py
  3. Executeout/malware.exe file!

shellcoder.py command line output

Output files

The output files of this script are stored inout/ directory:

  • malware.c - loader code with the injected payload as C string.
  • malware.exe - compiled loader with the injected payload.
  • shellcode.exe - executable file with the payload only. Great for debugging!
  • shellcode.bin - raw machine code of the assembly payload.

shellcoder.py output files

Caveats

  • Indicate that you are using 64-bit mode at the beginning of the assembly file. Add[bits 64] to theshellcode.asm.
  • Define entry point in assembly file (required for debugging):
[bits 64]section .text:global_start_start:[...YOUR CODE HERE...]

How to debug the payload?

The best way to debug your assembly code is to takeout/shellcode.exe file and load it into your favorite debugger.

Finally you should runout/malware.exe to be sure that your payload works as intended after memory injection.

About

Shellcoder.py - simple script to automate shellcoding process and shellcode testing.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp