shaddy43
just a normal person stuck with reverse engineering.
Cytomate Solutions & ServicesDOHA (QA), ISLAMABAD (PK)
Pinned Repositories
AES_Shellcode_Encryptor
This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Process of encrypting shellcode is very important for injection processes to bypass signature based detection by the security controls.
BrowserSnatch
This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out. A powerful Browser Stealer
Byte_Shuffler
This repository contains a bash script, that can change a specific set of bytes with random bytes to change a binary signature every time it is executed.
Donut_Injector
This repo gives you an injector that bypasses static and dynamic analysis. The shellcodes that are injected must be encrypted with a key and decrypted at runtime to avoid detection.
ExploitDB
This repository contains ideas and PoCs of malware that could be used for redteaming exercises to test an organizations security controls.
MalwareAnalysisSeries
This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the repo contains extracted TTPs with code along with the detection rules
PocketEncryptor
My own personal pet project that i use for encrypting private files before saving them on hard drives or on cloud. This repo can encrypt and decrypt any type of file (videos, images, files, docs etc). The encryption and decryption process is based on a key passed as parameter. Encryption is CBC AES 256 bit.
Position_Independent_Backdoor
This project contains methodology of creating position independent code that is used to extract shellcode from the generated binary. Position independent shellcode could be injected in any process for evading defenses and creating backdoors.
ReverseShell_NC
This repository contains a program that gives remote shell connection on the sockets back to the c2 server. This connection can be listened on Netcat as well. It is just a PoC for getting reverse shells by sending input messages, that are commands (from c2) and getting back output messages that are outputs or errors of those commands.
XOR_Shellcode_Encryptor
This repository contains xor shellcode encryptor that is used to bypass static or signature based detection of malicious shellcodes for Process Injection exploits
shaddy43's Repositories
shaddy43/BrowserSnatch
This project steals important data from all chromium and gecko browsers installed in the system and gather the data in a stealer db to be exfiltrated out. A powerful Browser Stealer
shaddy43/AES_Shellcode_Encryptor
This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Process of encrypting shellcode is very important for injection processes to bypass signature based detection by the security controls.
shaddy43/MalwareAnalysisSeries
This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the repo contains extracted TTPs with code along with the detection rules
shaddy43/Byte_Shuffler
This repository contains a bash script, that can change a specific set of bytes with random bytes to change a binary signature every time it is executed.
shaddy43/ReverseShell_NC
This repository contains a program that gives remote shell connection on the sockets back to the c2 server. This connection can be listened on Netcat as well. It is just a PoC for getting reverse shells by sending input messages, that are commands (from c2) and getting back output messages that are outputs or errors of those commands.
shaddy43/XOR_Shellcode_Encryptor
This repository contains xor shellcode encryptor that is used to bypass static or signature based detection of malicious shellcodes for Process Injection exploits
shaddy43/Position_Independent_Backdoor
This project contains methodology of creating position independent code that is used to extract shellcode from the generated binary. Position independent shellcode could be injected in any process for evading defenses and creating backdoors.
shaddy43/Donut_Injector
This repo gives you an injector that bypasses static and dynamic analysis. The shellcodes that are injected must be encrypted with a key and decrypted at runtime to avoid detection.
shaddy43/ExploitDB
This repository contains ideas and PoCs of malware that could be used for redteaming exercises to test an organizations security controls.
shaddy43/PocketEncryptor
My own personal pet project that i use for encrypting private files before saving them on hard drives or on cloud. This repo can encrypt and decrypt any type of file (videos, images, files, docs etc). The encryption and decryption process is based on a key passed as parameter. Encryption is CBC AES 256 bit.
shaddy43/SGCApp
secure group communication app
shaddy43/SGCAppV2
Secure group communications
shaddy43/shaddy43.github.io
Welcome to my portfolio, where I’ve curated all my blog posts and projects into a single, organized space.