Menu

Tree [r5] /
 History

HTTPS access


File Date Author Commit
 HelloWorld.s 2010-03-17 marf1 [r2] Committed pifus, all-in-one shellcode tool.
 README 2010-03-08 marf1 [r1] First release
 decrypt.py 2010-03-18 marf1 [r4] Newest version! Need to redo readme.
 pifus.py 2010-03-30 marf1 [r5] Fixed null bytes

Read Me

README for Pifuscate
Author: 
	Marfi (Ronnie Tokazowski)


Why?: 
	Because I could / to obfuscate shellcode

How to use it:
	To use it, run 'python pifuscate.py' without the '. Enter your shellcode, and it will obfuscate your shellcode. It will give you something to the extent of [1, 2, 3]. Copy / paste  the code WITH the []'s. From here, you can look at the test.py for examples, or keep reading. 

	You will need to import defuscate. I recommend using 'from defuscate import doMagic' since that is the only part of the file at this point in time. Copy the code in the []'s into your code. It's best to use foo = [1, 2, 3]. I will explain how it is obfuscated later in the README. You need to pass a flag of "h" or "u" depending on the type of shellcode imported. If it's hex, then use flag = "h" . For unescape, use flag = "u" . Now, your ready for the shellcode. killerCode = doMagic(flag, foo) will be the shellcode (if you used 'from defuscate import doMagic') , then you can use it to your heart's content. 

Example:
	See test.py for an example of how the code is used.