声明:该公众号分享的安全工具和项目均来源于网络,仅供安全研究与学习之用,如用于其他用途,由使用者承担全部法律及连带责任,与工具作者和本公众号无关。 |
现在只对常读和星标的公众号才展示大图推送,建议大家把Hack分享吧“设为星标”,否则可能看不到了!
工具介绍
https://github.com/rapid7/metasploit-framework/blob/master/modules/encoders/x86/shikata_ga_nai.rb
怎么样?& 为什么?
https://cloud.google.com/blog/topics/threat-intelligence/shikata-ga-nai-encoder-still-going-strong/
在 keystone 汇编程序库的帮助下,实现了以下改进。
64位支持。Finally properly encoded x64 shellcodes !
新的更小的解码器存根。LFSR key reduced to 1 byte
具有伪随机模式的编码存根。Decoder stub is also encoded with a psudo random schema
没有可见的循环条件Stub decodes itself WITHOUT using any loop conditions !!
解码器存根混淆。Random garbage instruction generator added with keystone
安全注册选项。Non of the registers are clobbered (optional preable, may reduce polimorphism)
工具使用
__ _ __ __ _
___ / / (_) /_____ _/ /____ _ ___ ____ _ ___ ___ _(_)
(_-</ _ / / '_/ _ `/ __/ _ `/ / _ `/ _ `/ / _ / _ `/ /
/___/_//_/_/_/_\_,_/__/_,_/ _, /_,_/ /_//_/_,_/_/
========[Author:-Ege-Balcı-]====/___/=======v2.0.1=========
┻━┻ ︵ヽ(`Д´)ノ︵ ┻━┻ (ノ ゜Д゜)ノ ︵ 仕方がない
Usage: sgn
Flags:
-h, --help Show context-sensitive help.
-i, --input=STRING Input binary path
-o, --out=STRING Encoded output binary name
-a, --arch=64 Binary architecture (32/64)
-c, --enc=1 Number of times to encode the binary (increases overall size)
-M, --max=50 Maximum number of bytes for decoder obfuscation
--plain Do not encode the decoder stub
--ascii Generates a full ASCI printable payload (may take very long time to bruteforce)
-S, --safe Preserve all register values (a.k.a. no clobber)
--badchars=STRING Don't use specified bad characters given in hex format (x00x01x02...)
-v, --verbose Verbose mode
--version
下载地址
推荐站内搜索:最好用的开发软件、免费开源系统、渗透测试工具云盘下载、最新渗透测试资料、最新黑客工具下载……
还没有评论,来说两句吧...