This is a Python script that converts shellcode into a PE32 or PE32+ file. It takes a shellcode file path and an architecture (win32 or win64) as input. The script creates a PE file with the provided shellcode. The script uses pre-defined stubs for PE32 and PE32+ files, and appends the shellcode to the stub. The resulting PE file is written to a new file with a .pe.bin extension.
FEATURES
ALTERNATIVES
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
A semi-automatic tool to generate YARA rules from virus samples.
Collection of Python scripts for automating tasks and enhancing IDA Pro functionality
A collection of reverse engineering challenges covering a wide range of topics and difficulty levels.
Define and validate YARA rule metadata with CCCS YARA Specification.
Standalone graphical utility for viewing Java source codes from ".class" files.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.