A versatile tool for working with shellcodes.
- core
extract
- extract from/to offsetmsfvenom
- create payloads with msfvenomoutput
- Inspect and display files in different formats
- encoder
aes
- Encrypt payload with AESbytebert
- advanced polymorphic encoderbyteswap
- New XOR Encryption, Swapping Bytes (Blog Post)xor
- Encode payload with custom XOR keyxorpoly
- polymorphic x64 in-memory decoder (for details, visit this Blog Post)
- inject
dll
- inject a dll into a processinjection
- inject shellcode into process (Windows only)ntinjection
- native injection with undocumented windows functionspsoverwrite
- process overwriting injection technique by hasherezade
- obfuscate
Feed
- Splits Bytes in a feed.xml file as article IDsQR-Code
hide OpCodes as QR-Code imageROR13
toROL
conversion with custom key (Windows only)UUID
obfuscation - Please, check out my Blog Post about this encoder
- stager
meterpreter
- Initiate ameterpreter/reverse_tcp
stagesliver
- Initiate ahttps
sliver stage
- archive
formatout
- display raw shellcodes inC++, C#
and more
git clone https://github.com/psycore8/shencode
cd shencode
pip install .
shencode -h
Check out the ShenCode Docs for more information.
general
- windows functions and constants sorted inwindef
andwinconst
general
- added a new category:inject
general
- module categories sorted in alphabetical ordergeneral
- updated dependenciesinject/psoverwrite
- Python adapted process overwriting techniqueinject/ntinjection
- native api injection (experimental)inject/dll
- dll injectionobfuscate/feed
- fixed typoobfuscate/qrcode
- fixed dependency error for PIL