pe_to_shellcode
Converts PE into a shellcode (by hasherezade)
donut
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters (by TheWover)
pe_to_shellcode | donut | |
---|---|---|
4 | 4 | |
2,208 | 3,245 | |
- | - | |
3.8 | 0.0 | |
9 months ago | about 2 months ago | |
C++ | C | |
BSD 2-clause "Simplified" License | BSD 3-clause "New" or "Revised" License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pe_to_shellcode
Posts with mentions or reviews of pe_to_shellcode.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-08-27.
-
Bypassing Windows Defender (10 Ways)
Finally, we also have the option to transform a native PE back to shellcode. This may be done, for example, via hasherezade's pe_to_shellcode tool.
- Petoshellcode - Converts PE into a shellcode
- pe_to_shellcode: Converts PE so that it can be then injected just like a normal shellcode. (At the same time, the output file remains to be a valid PE). Supports both 32 and 64 bit PEs
- Petoshellcode – Converts PE into a Shellcode
donut
Posts with mentions or reviews of donut.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-08-27.
-
Bypassing Windows Defender (10 Ways)
The Donut project by TheWover is a very effective Position-Independent shellcode generator from PEs/DLLs. Depending on the input file given, it works different ways. For this PoC I will be using Mimikatz, so let us see how it works at a high level. From a brief look at the code, this would be the main routine of the Donut.exe executable tool:
-
Cannot Load .NET assemblies in memory!
Note that I used the loader from donut and it worked as expected! What am I doing wrong here people?
-
BEST KALI TOOL TO MAKE UNDETECTABLE BACKDOOR 2022?
Donut -- tool to convert (certain, very simple, non-.NET) PE files into shellcode.
- Does anyone know any good x64 shellcode loaders?
What are some alternatives?
When comparing pe_to_shellcode and donut you can also consider the following projects:
DripLoader - Evasive shellcode loader for bypassing event-based injection detection (PoC)
dll_to_exe - Converts a DLL into EXE
Shhhloader - Syscall Shellcode Loader (Work in Progress)
pypackerdetect - Packing detection tool for PE files
vivanewvegas-wabbajack - A Wabbajack port of the Viva New Vegas modding guide.
pwntools - CTF framework and exploit development library
ThreatCheck - Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.
Alcatraz - x64 binary obfuscator
obfuscator
LsaParser - A shitty (and old) lsass parser.
openmw - OpenMW is an open-source open-world RPG game engine that supports playing Morrowind. Main repo and issue tracker can be found here: https://gitlab.com/OpenMW/openmw/
pe_to_shellcode vs DripLoader
donut vs DripLoader
pe_to_shellcode vs dll_to_exe
donut vs Shhhloader
pe_to_shellcode vs pypackerdetect
donut vs vivanewvegas-wabbajack
pe_to_shellcode vs pwntools
donut vs ThreatCheck
pe_to_shellcode vs Alcatraz
donut vs obfuscator
pe_to_shellcode vs LsaParser
donut vs openmw