5/5/2023 0 Comments Dev point crypter v3.0![]() ![]() add_argument ( "-e", "-encrypt", help = "encrypt shellcode", action = "store_true" ) parser. add_argument ( "inp", type = str, help = "shellcode to encrypt/decrypt/execute" ) parser. ArgumentParser ( add_help = True ) parser. Crypterįrom Crypto.Cipher import AES from Crypto.Random import random import argparse import random import sys import os #doing argument parsing You can find the code below, it is pretty heavily commented to help those who are not used to reading ugly python. The script successfully encrypts, decrypts, and executes shellcode. Execution Processįor execution, the script just appends a shellcode.c writing process onto the decryption function and then compiles and runs that file. I picked this concept up from the SLAE coursework itself, and it was awesome to apply it to this python script. ![]() The script iterates through the entire keyspace decrypting the input shellcode with each key until it spots our \\xff padding and then it knows it has found the right key and prints the output. The decryption scheme is straightforward.
0 Comments
Leave a Reply. |