A versatile tool for working with shellcodes.
ShenCode is a framework for developing, analyzing and testing shellcodes. It supports the following operating modes:
- Argument mode
shencode core output -i file.raw -s inspect
- Interactive Mode
shencode$ load output
shencode::core::output$
- Task Mode
- Automate modules in different steps with
json
- Automate modules in different steps with
Check out ShenCode Docs and the starter tutorial for more information.
Category | Description | Modules |
---|---|---|
core |
Shencode core functions | download - extract- minidump - output - subproc - task |
encoder |
Shellcode encoder | alphanum - bytebert - byteswap1 - multicoder - xor - xorpoly2 |
inject |
Process injection modules | dll - injection - linject - ntinjection - psoverwrite3 |
obfuscate |
Shellcode obfuscation techniques | feed - qrcode - rolhash - uuid |
payload |
Modules to generate payloads | msfvenom - winexec |
stager |
Stage loaders | meterpreter - sliver |
git clone https://github.com/psycore8/shencode
cd shencode
python -m venv .venv
<! ACTIVATE-VENV-SEE-BELOW !>
pip install .
shencode -h
To activate the virtual environment use the following command:
- Windows -
.venv\bin\activate
- Linux -
source .venv/bin/activate
general
- fixed some fstring errorscore/minidump
- dump a process from memory to disk with WinAPIinject/linject
- Linux based injection methodinject/psoverwrite
- Fixed NoCFG settingobfuscate/feed
- open file optimizationsstager/sliver
- save the stage to diskstager/sliver
- testing linux supportutils/interactive
- print config in json formatutils/style
- moved style settings from helper to style