Forwarded from Source Byte ( P҉d҉y҉👾)
sgn
https://github.com/EgeBalci/sgn
#shellcode
SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a additive feedback loop to encode given binary instructions similar to LSFR. This project is the reimplementation of the original Shikata ga nai in golang with many improvements.
https://github.com/EgeBalci/sgn
#shellcode
GitHub
GitHub - EgeBalci/sgn: Shikata ga nai (仕方がない) encoder ported into go with several improvements
Shikata ga nai (仕方がない) encoder ported into go with several improvements - EgeBalci/sgn
Forwarded from Source Byte ( P҉d҉y҉👾)
Win32 Reverse TCP Shellcode
Credit: Xenofon Vassilakopoulos
Pt1: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-1-Locating-the-kernelbase-address/
Pt2: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-2-Locate-the-Export-Directory-Table/
Pt3: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-3-Constructing-the-reverse-shell-connection/
Code:
https://github.com/xen0vas/Win32-Reverse-TCP-Shellcode.git
#shellcode #asm #winasm
Wanna learn how to write shellcode for your specific purpose in windows?
This is what you need !
Credit: Xenofon Vassilakopoulos
Pt1: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-1-Locating-the-kernelbase-address/
Pt2: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-2-Locate-the-Export-Directory-Table/
Pt3: https://xen0vas.github.io/Win32-Reverse-Shell-Shellcode-part-3-Constructing-the-reverse-shell-connection/
Code:
https://github.com/xen0vas/Win32-Reverse-TCP-Shellcode.git
#shellcode #asm #winasm