A versatile tool for working with shellcodes.
Category | Module | Description | Docs | Refs |
---|---|---|---|---|
core |
extract |
Extract a range of bytes from a file | extract | |
core |
output |
Inspect and display files in different formats | output | |
core |
subproc |
Execute an external subprocess | subproc | |
core |
task |
Execute tasks to automate ShenCode | task | |
encoder |
aes |
Encrypt with AES | aes | |
encoder |
alphanum |
Alphanumeric encoder to avoid null bytes | alphanum | |
encoder |
bytebert |
Advanced polymorphic encoder | bytebert | |
encoder |
byteswap |
New XOR Encryption, Swapping Bytes | byteswap | Blog Post |
encoder |
xor |
Encode payload with custom XOR key | xor | |
encoder |
xorpoly |
Polymorphic x64 in-memory decoder | xorpoly | Blog Post |
inject |
dll |
Inject dll into a process | dll | |
inject |
injection |
Inject shellcode into a process | injection | |
inject |
ntinjection |
Inject with native windows API | ntinjection | |
inject |
psoverwrite |
Process overwriting injection | psoverwrite | hasherezade |
obfuscate |
feed |
Hide shellcode bytes in a feed.xml file | feed | |
obfuscate |
qrcode |
Generate QR-Code from a file | qrcode | |
obfuscate |
rolhash |
ROR13 to custom ROL hashing | rolhash | |
obfuscate |
uuid |
Generate UUIDs from shellcode | uuid | Blog Post |
payload |
msfvenom |
Create payloads with msfvenom | msfvenom | |
payload |
winexec |
Create a shellcode with custom WinExec command | winexec | |
stager |
meterpreter |
Download a meterpreter reverse tcp stage | meterpreter | |
stager |
sliver |
Download a sliver stage | sliver |
git clone https://github.com/psycore8/shencode
cd shencode
pip install .
shencode -h
Check out the ShenCode Docs for more information.
general
- Function hashing supportgeneral
- New headergeneral
- Added a diceware wordlist for jump label obfuscationgeneral
- Added module description in--help
outputgeneral
- Dependencies updatedgeneral
- Optimizations, typos, fixescore/subproc
- Execute a subprocesscore/info
- Dev changespayload/msfvenom
- Moved to category payloadpayload/winexec
- Create a custom WinExec Shellcode with polymorphic featuresencoder/alphanum
- Instruction set changesutils
- Moved assembler instructions to asm.pyutils
- Added ROL hashing