• Stars
    star
    117
  • Rank 301,828 (Top 6 %)
  • Language
    Python
  • Created about 5 years ago
  • Updated about 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment

Windows shellcode emulation tool based upon unicorn framework.

ShellcodeEmulator emulates Windows shellcode with the help of windbg process memory dumps. You can provide shellcode to analyze with any Windows process dump image. The tool will emulate as much as of the userland code using the shellcode bytes and the provided dump image.

You can add your custom syscall handlers or any handlers in between the API calls used by shellcode and the kernel layer. This can provide full view of the user stack. It will let you investigate shellcode that bypasses loose API hooks in higher callstack level.

Installation

  1. Install WinDbg

  2. Install ShellcodeEmulator

pip install git+https://github.com/ohjeongwook/ShellcodeEmulator --upgrade
  1. Please run following command if you experience any PyKD/WinDbg integration issues
    • PyKD has some issues with DLL package distribution.
python -m pykdfix.fix_windbg_files

Usage

> python -m shellcode_emulator.run

Usage: run.py [options] args

Options:
  -h, --help            show this help message and exit
  -b IMAGE_BASE, --image_base=IMAGE_BASE
                        Image base to load the shellcode inside process memory
  -d DUMP_FILENAME, --dump_filename=DUMP_FILENAME
                        A process dump file from normal Windows process
  -l LIST_FILENAME, --list_filename=LIST_FILENAME
                        A list filename generated by IDA (this can be used
                        instead of shellcode filename)

Example

  1. Take process dump from Windows notepad process using Process Explorer and save it as notepad.dmp
  2. Run wincalc.bin shellcode
python -m shellcode_emulator.run wincalc.bin -d notepad.dmp

More Repositories

1

DarunGrim

A patch analysis tool
359
star
2

dumpflash

Low-level NAND Flash dump and parsing utility
Python
288
star
3

Samsung-TV-Hacks

Python
111
star
4

FlashHacker

Adobe Flash Player File Instrumentation Tool For Security Research
C++
86
star
5

PowerShellRunBox

Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality
C#
82
star
6

binkit

Binary Reverse Engineering Data Science Kit
C
74
star
7

iptanalyzer

Intel PT log analyzer With Parallel Processing And Basic Block Offset Caching Support
Python
69
star
8

windows_sdk_data

Windows API listing in JSON format - generated from SDK headers + SDK API documentation
66
star
9

windbgtool

Windbg Utility Tools based upon PyKD
Python
40
star
10

REPack

Reverse engineering toolkit for exploit/malware analysis
34
star
11

CanBusHacker

C
28
star
12

sRDI

Python
26
star
13

Frida.examples.vbe

Frida example to trace VBA CreateObject calls and some string deobfuscations calls. You need latest Frida 12.9.8 for improved symbol lookup features I added recently.
JavaScript
25
star
14

WindowsEventTools

Collection Of Scripts And Utilities For Windows Event Hunting
PowerShell
16
star
15

Publications

15
star
16

AMFParser

Fiddler2 Plugin for AMF format parsing
C#
13
star
17

RunShellcode

Windows Shellcode Testing Utility to Run Shellcode From A File
C++
11
star
18

LoadDLL

Windows DLL Loading Utility
C++
9
star
19

threathuntingtools

WindowsEvents + Sysmon + ElasticSearch + Python
Python
8
star
20

ResearchToolbox

C++
8
star
21

VisualInspector

A plugin for Windbg that generates graphical outputs
C++
8
star
22

idatool

IDAPython Utilities And Tools
Python
7
star
23

WindowsTestingEnvironment

Instructions And Scripts To Setup Windows Malware, Exploit Testing Environment
PowerShell
7
star
24

iPhoneFuzzBridge

A frameworks for using legacy fuzzying frameworks against iPhone fuzzing
Python
5
star
25

petool

PE File Manipulation Utility
Python
5
star
26

viscope

Automatically exported from code.google.com/p/viscope
C++
3
star
27

MaliciousPowerShellSamples

PowerShell
3
star
28

InjectShellcode

C++
3
star
29

MalwareHuntingRules

YARA
2
star
30

idagrapher

Automatically exported from code.google.com/p/idagrapher
Python
1
star