Tested and working on 64-bit Windows machines. Written in Python, memory execution and de-obfuscation is done in C++.
Update payload bytes in the file payload.py, run it, paste the output to run.cpp, compile and run the run.cpp file on the target machine. To edit and compile the de-obfuscator you can use GCC.
This application has been made for educational purposes only, I don’t promote malicious practices and will not be responsible for any illegal activities. It should be used for authorized testing or educational purposes only.