Skip to content

psycore8/shencode

Repository files navigation

ShenCode

A versatile tool for working with shellcodes.

Features

Version 0.8.2

Category Module Description Docs Refs
core extract Extract a range of bytes from a file extract
core output Inspect and display files in different formats output
core subproc Execute an external subprocess subproc
core task Execute tasks to automate ShenCode task
encoder aes Encrypt with AES aes
encoder alphanum Alphanumeric encoder to avoid null bytes alphanum
encoder bytebert Advanced polymorphic encoder bytebert
encoder byteswap New XOR Encryption, Swapping Bytes byteswap Blog Post
encoder xor Encode payload with custom XOR key xor
encoder xorpoly Polymorphic x64 in-memory decoder xorpoly Blog Post
inject dll Inject dll into a process dll
inject injection Inject shellcode into a process injection
inject ntinjection Inject with native windows API ntinjection
inject psoverwrite Process overwriting injection psoverwrite hasherezade
obfuscate feed Hide shellcode bytes in a feed.xml file feed
obfuscate qrcode Generate QR-Code from a file qrcode
obfuscate rolhash ROR13 to custom ROL hashing rolhash
obfuscate uuid Generate UUIDs from shellcode uuid Blog Post
payload msfvenom Create payloads with msfvenom msfvenom
payload winexec Create a shellcode with custom WinExec command winexec
stager meterpreter Download a meterpreter reverse tcp stage meterpreter
stager sliver Download a sliver stage sliver

How to use

Install
git clone https://github.com/psycore8/shencode
cd shencode
pip install .
shencode -h

General usage

Check out the ShenCode Docs for more information.

Release Notes

  • general - Function hashing support
  • general - New header
  • general - Added a diceware wordlist for jump label obfuscation
  • general - Added module description in --help output
  • general - Dependencies updated
  • general - Optimizations, typos, fixes
  • core/subproc - Execute a subprocess
  • core/info - Dev changes
  • payload/msfvenom - Moved to category payload
  • payload/winexec - Create a custom WinExec Shellcode with polymorphic features
  • encoder/alphanum - Instruction set changes
  • utils - Moved assembler instructions to asm.py
  • utils - Added ROL hashing

References