Writing shellcodes has always been super fun, but some parts are extremely boring and error prone. Focus only on the fun part, and use ShellNoob!
- convert shellcode between different formats and sources. Formats currently supported: asm, bin, hex, obj, exe, C, python, ruby, pretty, safeasm, completec, shellstorm. (All details in the “Formats description” section.)
- interactive asm-to-opcode conversion (and viceversa) mode. This is useful when you cannot use specific bytes in the shellcode and you want to figure out if a specific assembly instruction will cause problems.
- support for both ATT & Intel syntax. Check the –intel switch.
- support for 32 and 64 bits (when playing on x86_64 machine). Check the –64 switch.
- resolve syscall numbers, constants, and error numbers (now implemented for real! :-)).
- portable and easily deployable (it only relies on gcc/as/objdump and python). It is just one self-contained python script, and it supports both Python2.7+ and Python3+.
- in-place development: you run ShellNoob directly on the target architecture!
- built-in support for Linux/x86, Linux/x86_64, Linux/ARM, FreeBSD/x86, FreeBSD/x86_64.
- “prepend breakpoint” option. Check the -c switch.
- read from stdin / write to stdout support (use “-” as filename)
- uber cheap debugging: check the –to-strace and –to-gdb option!
- Use ShellNoob as a Python module in your scripts! Check the “ShellNoob as a library” section.
- Verbose mode shows the low-level steps of the conversion: useful to debug / understand / learn!
- Extra plugins: binary patching made easy with the –file-patch, –vm-patch, –fork-nopper options! (all details below)
download from :- https://github.com/reyammer/shellnoob
- Easy Way To Crack Password Using John The Ripper In Kali Linux
- Kali Linux Tutorial: Setting Up ProxyChains + Tor For Anonymity And Security
- Kali Linux Tutorial: Introduction To Parsero Vulnerability Analysis Tool
TOOLS INCLUDED IN THE SHELLNOOB PACKAGE
- root@kali:~# shellnoob -h
- shellnoob.py [–from-INPUT] (input_file_path | – ) [–to-OUTPUT] [output_file_path | – ]
- shellnoob.py -c (prepend a breakpoint (Warning: only few platforms/OS are supported!)
- shellnoob.py –64 (64 bits mode, default: 32 bits)
- shellnoob.py –intel (intel syntax mode, default: att)
- shellnoob.py -q (quite mode)
- shellnoob.py -v (or -vv, -vvv)
- shellnoob.py –to-strace (compiles it & run strace)
- shellnoob.py –to-gdb (compiles it & run gdb & set breakpoint on entrypoint)
- Standalone “plugins”
- shellnoob.py -i [–to-asm | –to-opcode ] (for interactive mode)
- shellnoob.py –get-const <const>
- shellnoob.py –get-sysnum <sysnum>
- shellnoob.py –get-strerror <errno>
- shellnoob.py –file-patch <exe_fp> <file_offset> <data> (in hex). (Warning: tested only on x86/x86_64)
- shellnoob.py –vm-patch <exe_fp> <vm_address> <data> (in hex). (Warning: tested only on x86/x86_64)
- shellnoob.py –fork-nopper <exe_fp> (this nops out the calls to fork(). Warning: tested only on x86/x86_64)
- shellnoob.py –install [–force] (this just copies the script in a convinient position)
- shellnoob.py –uninstall [–force]
- Supported INPUT format: asm, obj, bin, hex, c, shellstorm
- Supported OUTPUT format: asm, obj, exe, bin, hex, c, completec, python, bash, ruby, pretty, safeasm
- All combinations from INPUT to OUTPUT are supported!
- Check out the README file for more info.
SHELLNOOB USAGE EXAMPLE:-
Start in interactive mode (-i) in asm to opcode mode (–to-opcode):
- root@kali:~# shellnoob -i –to-opcode
- asm_to_opcode selected (type “quit” or ^C to end)
- >> xchg %eax, %esp
- xchg %eax, %esp ~> 94
- >> ret
- ret ~> c3