Categories: Kali Linux

Shellcode-Encrypter-Decrypter : Shellcode Encrypter & Decrypter by using XOR Cipher

Shellcode-Encrypter-Decrypter is a Shellcode Encrypter & Decrypter, Using XOR Cipher to enc and dec shellcode.

Shellcode-Encrypter-Decrypter Installation

git clone https://github.com/blacknbunny/Shellcode-Encrypter-Decrypter.git && cd Shellcode-Encrypter-Decrypter/

python enc.py --help

Also ReadMunin – Online Hash Checker For Virustotal & Other Services

Usage Example

Encryption:
    python encdecshellcode.py --shellcode \x41\x41\x42\x42 --key SECRETKEY --option encrypt
Decryption:
    python encdecshellcode.py --shellcode \x41\x41\x42\x42 --key SECRETKEY --option decrypt

Help

usage: enc.py [-h]  [-s SHELLCODE]  [-k KEY]  [-o OPTION]
Encrypting & Decrypting Shellcode
optional arguments:
       -h,  --help   show this help message and exit
        -s  SHELLCODE, --shelcode SHELCODE
    Shellcode To Encrypt & Decrypt
        -k  KEY,  --key KEY  Key Of The Shellcode To Encrypt & Decrypt
        -o  OPTION,   --option  OPTION
    Argument For Encrypting & Decrypting Shellcode

R K

Recent Posts

Cybersecurity Toolkit – Essential Python Tools For Penetration Testing

Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…

18 hours ago

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools…

18 hours ago

Dark FB – A Comprehensive Toolkit For Advanced Facebook Interactions

"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…

18 hours ago

Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing

Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…

2 days ago

THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping

This repository was created with the aim of assisting companies and independent researchers about Tactics,…

2 days ago

MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities

A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…

2 days ago