Menu

Tree [r5] /
 History

HTTPS access


File Date Author Commit
 HelloWorld.s 2010-03-17 marf1 [r2] Committed pifus, all-in-one shellcode tool.
 README 2010-03-08 marf1 [r1] First release
 decrypt.py 2010-03-18 marf1 [r4] Newest version! Need to redo readme.
 pifus.py 2010-03-30 marf1 [r5] Fixed null bytes

Read Me

README for Pifuscate
Author: 
	Marfi (Ronnie Tokazowski)


Why?: 
	Because I could / to obfuscate shellcode

How to use it:
	To use it, run 'python pifuscate.py' without the '. Enter your shellcode, and it will obfuscate your shellcode. It will give you something to the extent of [1, 2, 3]. Copy / paste  the code WITH the []'s. From here, you can look at the test.py for examples, or keep reading. 

	You will need to import defuscate. I recommend using 'from defuscate import doMagic' since that is the only part of the file at this point in time. Copy the code in the []'s into your code. It's best to use foo = [1, 2, 3]. I will explain how it is obfuscated later in the README. You need to pass a flag of "h" or "u" depending on the type of shellcode imported. If it's hex, then use flag = "h" . For unescape, use flag = "u" . Now, your ready for the shellcode. killerCode = doMagic(flag, foo) will be the shellcode (if you used 'from defuscate import doMagic') , then you can use it to your heart's content. 

Example:
	See test.py for an example of how the code is used. 
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.