Name | Modified | Size | Downloads / Week |
---|---|---|---|
test.py | 2010-03-08 | 388 Bytes | |
README | 2010-03-08 | 1.1 kB | |
pifuscate.py | 2010-03-08 | 813 Bytes | |
obmod.py | 2010-03-08 | 873 Bytes | |
defuscate.py | 2010-03-08 | 1.1 kB | |
Totals: 5 Items | 4.3 kB | 0 |
README for Pifuscate Author: Marfi (Ronnie Tokazowski) Why?: Because I could / to obfuscate shellcode How to use it: To use it, run 'python pifuscate.py' without the '. Enter your shellcode, and it will obfuscate your shellcode. It will give you something to the extent of [1, 2, 3]. Copy / paste the code WITH the []'s. From here, you can look at the test.py for examples, or keep reading. You will need to import defuscate. I recommend using 'from defuscate import doMagic' since that is the only part of the file at this point in time. Copy the code in the []'s into your code. It's best to use foo = [1, 2, 3]. I will explain how it is obfuscated later in the README. You need to pass a flag of "h" or "u" depending on the type of shellcode imported. If it's hex, then use flag = "h" . For unescape, use flag = "u" . Now, your ready for the shellcode. killerCode = doMagic(flag, foo) will be the shellcode (if you used 'from defuscate import doMagic') , then you can use it to your heart's content. Example: See test.py for an example of how the code is used.