You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Write your shellcode in Assembly and execute it with one command!
3
+
Write your shellcode in Assembly (NASM) and compile it on Windows x64 with one command!
4
4
5
-
This script helps automate the shellcode testing process. It takes an Assembly file with the shellcode (`shellcode.asm`), compiles it into machine code (NASM), generates a payload in C with that, and pastes it into the `loader.c` file. Finally, the prepared C file is compiled using MSVC. With this script you go from Assembly shellcode to executable file with one command!
5
+
This script helps automate the shellcode development and testing process. It takes your Assembly file with the payload (`shellcode.asm`) and generates a bunch of useful executable files (read below).
6
6
7
-
## Usage
7
+
You don't have to repeat all these tedious activities anymore to make your shellcode executable! Keep your focus on shellcoding 🔥🐚🔥
8
+
9
+
## Installation
10
+
11
+
The following software must be installed on your system:
8
12
9
-
Shellcoder script most probably should be used on Windows because of the MSVC requirement.
13
+
-[Python 3](https://www.python.org/downloads/)
14
+
-[NASM (Netwide Assembler)](https://www.nasm.us/)
15
+
-[Visual Studio 2022](https://visualstudio.microsoft.com/)
16
+
17
+
No Python dependencies are necessary! You are ready to go.
18
+
19
+
## Usage
10
20
11
21
1. Write your shellcode in `shellcode.asm`
12
22
2. Run `python shellcoder.py`
13
-
3. Execute output `.exe` file in `out/` directory!
23
+
3. Execute `out/malware.exe` file!
24
+
25
+

26
+
27
+
## Output files
28
+
29
+
The output files of this script are stored in `out/` directory:
30
+
31
+
-`malware.c` - loader code with the injected payload as C string.
32
+
-`malware.exe` - compiled loader with the injected payload.
33
+
-`shellcode.exe` - executable file with the payload only. Great for debugging!
34
+
-`shellcode.bin` - raw machine code of the assembly payload.
0 commit comments