Skip to content

A simple C implementation to decoded your shellcode and writes it directly to memory

License

Notifications You must be signed in to change notification settings

mhaskar/Shellcode-In-Memory-Decoder

Repository files navigation

Shellcode-In-Memory-Decoder

A simple C implementation to decoded your shellcode and writes it directly to memory, You can use this code to perform process injection.

Usage

You need to encode your shellcode first, the file xor-encoder.py is a very simple example of how you can encode your shellcode using XOR.

Then you need to copy the output of xor-encoder.py and paste it into shellcode array in the file decoder.c.

To compile the code from Linux you can use Mingw64 Like the following:

x86_64-w64-mingw32-gcc decoder.c -o decoder.exe -w

After that, you can run it in the target machine and pass the PID like the following:

C:\Users\askar\Desktop>decoder.exe 3796

Run Decoder

And after we run it, we will get the following nice beacon:

GitHub Logo

About

A simple C implementation to decoded your shellcode and writes it directly to memory

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published