/Shellcode-In-Memory-Decoder

A simple C implementation to decoded your shellcode and writes it directly to memory

Primary LanguageCGNU General Public License v3.0GPL-3.0

Shellcode-In-Memory-Decoder

A simple C implementation to decoded your shellcode and writes it directly to memory, You can use this code to perform process injection.

Usage

You need to encode your shellcode first, the file xor-encoder.py is a very simple example of how you can encode your shellcode using XOR.

Then you need to copy the output of xor-encoder.py and paste it into shellcode array in the file decoder.c.

To compile the code from Linux you can use Mingw64 Like the following:

x86_64-w64-mingw32-gcc decoder.c -o decoder.exe -w

After that, you can run it in the target machine and pass the PID like the following:

C:\Users\askar\Desktop>decoder.exe 3796

Run Decoder

And after we run it, we will get the following nice beacon:

GitHub Logo