This is a Python script that converts shellcode into a PE32 or PE32+ file. It takes a shellcode file path and an architecture (win32 or win64) as input. The script creates a PE file with the provided shellcode. The script uses pre-defined stubs for PE32 and PE32+ files, and appends the shellcode to the stub. The resulting PE file is written to a new file with a .pe.bin extension.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool that extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.
Code to prevent a managed .NET debugger/profiler from working.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A program to manage yara ruleset in a database with support for different databases and configuration options.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.