I had not posted my Python script to convert shellcode to VBScript, so here it is.
Download:
shellcode2vbscript_v0_1.zip (https)
MD5: AAB0431127C657C9A3EF67E1C73E6711
SHA256: D1CDDAFCB734EC3F35E558DECFF2EDB73DC0C394936814B602B605F09DE4A5E5
I had not posted my Python script to convert shellcode to VBScript, so here it is.
Download:
shellcode2vbscript_v0_1.zip (https)
MD5: AAB0431127C657C9A3EF67E1C73E6711
SHA256: D1CDDAFCB734EC3F35E558DECFF2EDB73DC0C394936814B602B605F09DE4A5E5
RSS feed for comments on this post. TrackBack URI
This site uses Akismet to reduce spam. Learn how your comment data is processed.
i want to learn hacking & programing.please met with me
Comment by ebrahim — Wednesday 6 May 2009 @ 13:50
Here is a basic programming introduction book for high school students: How to Think Like a Computer Scientist http://openbookproject.net//thinkCSpy/
It uses Python as example language.
Comment by Didier Stevens — Wednesday 6 May 2009 @ 15:13
nice. useful. i assume you’re aware that metasploit can do the same via msfpayload? http://vimeo.com/3358923
Comment by jcran — Wednesday 6 May 2009 @ 17:37
Thanks! I wasn’t aware of this Metasploit feature at the time of the original posting, I only found out later, I believe it was on carnal0wnage’s blog.
Comment by Didier Stevens — Wednesday 6 May 2009 @ 17:43
[…] The Excel spreadsheet contains macros that use VirtualAlloc, WriteProcessMemory and CreateThread to “inject” shellcode (stored inside macros) into the Excel process itself. Details here and source code here. […]
Pingback by Excel with cmd.dll & regedit.dll « Didier Stevens — Monday 8 February 2010 @ 21:18
[…] generate VBA code for this shellcode + DLL with shellcode2vbscript.py […]
Pingback by MemoryLoadLibrary: From C Program to Shellcode « Didier Stevens — Tuesday 16 February 2010 @ 0:41
[…] Shellcode 2 VBScript […]
Pingback by Exploit writing tutorial part 11 : Heap Spraying Demystified | Corelan Team — Sunday 1 January 2012 @ 6:54
[…] This update adds x64 shellcode support to my shellcode2vbs.py script. […]
Pingback by shellcode2vba | Didier Stevens — Monday 24 June 2013 @ 4:00
[…] https://blog.didierstevens.com/2009/05/06/shellcode-2-vbscript/ […]
Pingback by Bypass McAfee Application Control——Code Execution – 煌轩博客 — Wednesday 31 August 2016 @ 4:36