{"id":22368,"date":"2022-03-04T10:44:48","date_gmt":"2022-03-04T10:44:48","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=22368"},"modified":"2022-03-04T10:44:51","modified_gmt":"2022-03-04T10:44:51","slug":"scemu","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/scemu\/","title":{"rendered":"Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes"},"content":{"rendered":"\n<p><strong>Scemu <\/strong>is a x86 32bits emulator, for securely emulating shellcodes<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/sha0coder\/scemu#features\"><\/a><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>&nbsp;rust safety, good for malware.<ul><li>All dependencies are in rust.<\/li><li>zero unsafe{} blocks.<\/li><\/ul><\/li><li>&nbsp;very fast emulation (much faster than unicorn)<ul><li>3,000,000 instructions\/second<\/li><li>100,000 instructions\/second printing every instruction -vv.<\/li><\/ul><\/li><li>powered by iced-x86 rust disassembler awesome library.<\/li><li>iteration detector.<\/li><li>memory and register tracking.<\/li><li>colorized.<\/li><li>stop at specific moment and explore the state or modify it.<\/li><li>174 instructions implemented.<\/li><li>112 winapi implemented of 5 dlls.<\/li><li>all linux syscalls.<\/li><li>SEH chains.<\/li><li>vectored exception handler.<\/li><li>PEB, TEB structures.<\/li><li>memory allocator.<\/li><li>react with int3.<\/li><li>non debugged cpuid.<\/li><li>tests with known payloads:<ul><li>metasploit shellcodes.<\/li><li>metasploit encoders.<\/li><li>cobalt strike.<\/li><li>shellgen.<\/li><li>guloader (not totally for now, but arrive further than the debugger)<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>TODO<\/strong><\/p>\n\n\n\n<ul class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background wp-block-list\"><li><strong>more fpu<\/strong><\/li><li><strong>mmx<\/strong><\/li><li><strong>64 bits<\/strong><\/li><li><strong>scripting?<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>SCEMU 32bits emulator for Shellcodes 0.2.5<br>@sha0coder<br>USAGE:<br>scemu [FLAGS] [OPTIONS]<br>FLAGS:<br>-e, &#8211;endpoint perform communications with the endpoint, use tor or vpn!<br>-h, &#8211;help Prints help information<br>-l, &#8211;loops show loop interations, it is slow.<br>-m, &#8211;memory trace all the memory accesses read and write.<br>-n, &#8211;nocolors print without colors for redirectin to a file &gt;out<br>-r, &#8211;regs print the register values in every step.<br>-V, &#8211;version Prints version information<br>-v, &#8211;verbose -vv for view the assembly, -v only messages, without verbose only see the api calls and goes<br>faster<br>OPTIONS:<br>-b, &#8211;base set base address for code<br>-c, &#8211;console select in which moment will spawn the console to inspect.<br>-C, &#8211;console_addr spawn console on first eip = address<br>-a, &#8211;entry entry point of the shellcode, by default starts from the beginning.<br>-f, &#8211;filename set the shellcode binary file.<br>-i, &#8211;inspect monitor memory like: -i &#8216;dword ptr [ebp + 0x24]<br>-M, &#8211;maps select the memory maps folder<br>-R, &#8211;reg trace a specific register in every step, value and content<br>-s, &#8211;string monitor string on a specific a<\/strong>ddress<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Some use cases<\/strong><\/p>\n\n\n\n<p>scemu emulates a simple shellcode detecting the execve() interrupt.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhqt77IpueeDJ7OkPmyS-K3ap4UJscCw4lZuatucI16N2jQYidOd4xw0VD98YQ56rtBFTk4GV6lAgV5tf4TnY86RwuP_p4x_gc9daj7U5Br51XmNBbKnGArx63qBjPvqUu7O9DKPzy4jZOMU6fBxX7PVEF4ydyWsrrCjmsbmotRBb2_sMAY7H9o1MuT=s581\" alt=\"\" \/><\/figure>\n\n\n\n<p>We select the line to stop and inspect the memory<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgE5W9XzE1NzvcMNqDS337FDgaSZWELTHf0X3iE283yjovJFnLWx6FraXH5fUK_rVeyh_-0ENR_t2dLRteFh1kk8tHzWFj6IaH7XrTy6XgEvwDgcLzoctcLZhWjQhowRdLDJavfb9OaaueGOR2JnnkAwSf4ZqAEfynsWPSmJly-oJhgNtAxsfUmTske=s661\" alt=\"\" \/><\/figure>\n\n\n\n<p>After emulating near 2 million instructions of GuLoader win32 in linux, faking cpuid&#8217;s and other tricks in the way, arrives to a sigtrap to confuse debuggers.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgSThJsag8KJFyhQzHMdXD84Moi3LgwvhOnNqNwl_xc3BTpvpbyvFqVTcYlET4tLICufAXgDWa1ZfXtmiuePtQe1_A8PdL7i_bbFjKDCchA23azvMzo2-zDSugoi0xMZvbK2KNjeL0n0drhWjk1s1CiDgG7RZ2Ai_l_7KjsyNIpQ2cLvbW9dS8sSPVE=s908\" alt=\"\" \/><\/figure>\n\n\n\n<p>Example of memory dump on the api loader.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj8CYySILs33RXh74gdrX-i3aGwRHmUw8-_Pht9A2sd3RRj7iAyk7b1vuLq1SU-IqwlRRJZwYIbb9PEYh6u70BvgfhbiSc_q-4HfrlSxJ_RgYLbtalvZpS6LWTpoA74ARxzLvkoV-es00K0whCvfO3TIxUrlX4I4SBMtu8bnT8VfRIqvk4KxqVPrYx-=s625\" alt=\"\" \/><\/figure>\n\n\n\n<p>There are several maps by default, and can be created more with apis like LoadLibraryA or manually from the console<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgeD0_mDmNmvX_Cdn-8v-mWCzvbdFfKjli_U1aRlk4xrl78EAb60q8B4lUT6GuJThoyvQfj4lklWj8LhIL27lvPGGkZWvB4Pl6G4b5YNRv4wAZoW4oaV6A9_NpZewEwG6OfDuYdTbk1FzSHf2JpBNQcUeV22AJZcei_0oRomiVV6WxrQXT83pSq0jZj=s625\" alt=\"\" \/><\/figure>\n\n\n\n<p>Emulating basic windows shellcode based on LdrLoadDLl() that prints a message:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiAd40Pbu7Z9Jr_X8yg7-uXK5hbMUR-DnJvO6xD7OE9t1L7vFBH8WSnVv0p4HcfummBpg_sza9XlL6MbEFYlO8r-FeJLoUw0VRp-rXSLJd4HsZkWVAp_xbxBT1Ym_oDFnc_5b95ZViWi6qcnTx72bpf2C1a2BHLHHX-qVTpnRIXJrNiY2MDzdlE7cYc=s392\" alt=\"\" \/><\/figure>\n\n\n\n<p>The console allow to view an edit the current state of the cpu:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>&#8212; console &#8212;<br>=&gt;h<br>&#8212; help &#8212;<br>q \u2026\u2026\u2026\u2026\u2026\u2026\u2026. quit<br>cls \u2026\u2026\u2026\u2026\u2026\u2026.. clear screen<br>h \u2026\u2026\u2026\u2026\u2026\u2026\u2026. help<br>s \u2026\u2026\u2026\u2026\u2026\u2026\u2026. stack<br>v \u2026\u2026\u2026\u2026\u2026\u2026\u2026. vars<br>r \u2026\u2026\u2026\u2026\u2026\u2026\u2026. register show all<br>r reg \u2026\u2026\u2026\u2026\u2026\u2026 show reg<br>rc \u2026\u2026\u2026\u2026\u2026\u2026\u2026 register change<br>f \u2026\u2026\u2026\u2026\u2026\u2026\u2026. show all flags<br>fc \u2026\u2026\u2026\u2026\u2026\u2026\u2026 clear all flags<br>fz \u2026\u2026\u2026\u2026\u2026\u2026\u2026 toggle flag zero<br>fs \u2026\u2026\u2026\u2026\u2026\u2026\u2026 toggle flag sign<br>c \u2026\u2026\u2026\u2026\u2026\u2026\u2026. continue<br>ba \u2026\u2026\u2026\u2026\u2026\u2026\u2026 breakpoint on address<br>bi \u2026\u2026\u2026\u2026\u2026\u2026\u2026 breakpoint on instruction number<br>bmr \u2026\u2026\u2026\u2026\u2026\u2026.. breakpoint on read memory<br>bmw \u2026\u2026\u2026\u2026\u2026\u2026.. breakpoint on write memory<br>bc \u2026\u2026\u2026\u2026\u2026\u2026\u2026 clear breakpoint<br>n \u2026\u2026\u2026\u2026\u2026\u2026\u2026. next instruction<br>eip \u2026\u2026\u2026\u2026\u2026\u2026.. change eip<br>push \u2026\u2026\u2026\u2026\u2026\u2026. push dword to the stack<br>pop \u2026\u2026\u2026\u2026\u2026\u2026.. pop dword from stack<br>fpu \u2026\u2026\u2026\u2026\u2026\u2026.. fpu view<br>md5 \u2026\u2026\u2026\u2026\u2026\u2026.. check the md5 of a memory map<br>seh \u2026\u2026\u2026\u2026\u2026\u2026.. view SEH<br>veh \u2026\u2026\u2026\u2026\u2026\u2026.. view vectored execption pointer<br>m \u2026\u2026\u2026\u2026\u2026\u2026\u2026. memory maps<br>ma \u2026\u2026\u2026\u2026\u2026\u2026\u2026 memory allocs<br>mc \u2026\u2026\u2026\u2026\u2026\u2026\u2026 memory create map<br>mn \u2026\u2026\u2026\u2026\u2026\u2026\u2026 memory name of an address<br>ml \u2026\u2026\u2026\u2026\u2026\u2026\u2026 memory load file content to map<br>mr \u2026\u2026\u2026\u2026\u2026\u2026\u2026 memory read, speficy ie: dword ptr [esi]<br>mw \u2026\u2026\u2026\u2026\u2026\u2026\u2026 memory read, speficy ie: dword ptr [esi] and then: 1af<br>md \u2026\u2026\u2026\u2026\u2026\u2026\u2026 memory dump<br>mrd \u2026\u2026\u2026\u2026\u2026\u2026.. memory read dwords<br>mds \u2026\u2026\u2026\u2026\u2026\u2026.. memory dump string<br>mdw \u2026\u2026\u2026\u2026\u2026\u2026.. memory dump wide string<br>mdd \u2026\u2026\u2026\u2026\u2026\u2026.. memory dump to disk<br>mt \u2026\u2026\u2026\u2026\u2026\u2026\u2026 memory test<br>ss \u2026\u2026\u2026\u2026\u2026\u2026\u2026 search string<br>sb \u2026\u2026\u2026\u2026\u2026\u2026\u2026 search bytes<br>sba \u2026\u2026\u2026\u2026\u2026\u2026.. search bytes in all the maps<br>ssa \u2026\u2026\u2026\u2026\u2026\u2026.. search string in all the maps<br>ll \u2026\u2026\u2026\u2026\u2026\u2026\u2026 linked list walk<br>d \u2026\u2026\u2026\u2026\u2026\u2026\u2026. dissasemble<br>dt \u2026\u2026\u2026\u2026\u2026\u2026\u2026 dump structure<br>enter \u2026\u2026\u2026\u2026\u2026\u2026 st<\/strong>ep into<\/p>\n\n\n\n<p>The cobalt strike api loader is the same that metasploit, emulating it:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgcFUFLND7JTPCa0SpJQXsLY61DG8qMr18v8KJru9rysg-LTyB152TMUPz7oz-rr43Lwj-usAN1WO1yes3K_mZx9ooNM8Ip4BP41PqFxd2UhmDzX6YlH2MjdOdAz-QrCrK6MZNv9uohGzzNcOfk6WRJgXbkYPjr81eXbkZKi9LbOPfW7QG4s3npjcdE=s647\" alt=\"\" \/><\/figure>\n\n\n\n<p>Cobalt Strike API called:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgbzavDMrTOgOcLKBK8K9YrvyNoNxgpik09tV3o3bCP1Z6fu_QZS4TnIfQQ7heJ2OKebYm5w7LJqgoVxCkmqp4QYNpYDftJz7fmc7kOX2Jsz5-mJMyhSkLua7jC6Ra6Qokz-RotuOpxnoPCUdSkv6dyUSaI-5LpSdh-cG0k-Zp16RWu1xsRO4iy74Ci=s952\" alt=\"\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQZ3UnJVZhuHWGhOUrTLddhWzNZ8ikgxCdtpbQe0tB_BRJ1tCyAP_afifcBTI6KFXB9wqAewO4abtj2plWFLyXGOScZoDDdunULWRX7LJzRw2i5jo44RNzEavjekT2XSVMzPJRdnTeNCqSQ4Hg88rj6uZbqhDKkzvDcRT9pQEuY2QygQ31zolkFcYE=s586\" alt=\"\" \/><\/figure>\n\n\n\n<p>Metasploit SGN encoder using few fpu to hide the polymorfism:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgmsffOY3vlfMDlltbVrIWTIob5iGgC6F70KM0BTdiKr4BIucOtVJKNZoNHkSGIU1Nfh0r5vjiuO3Js4afAWwsusAWk59AZiVV0WztNL19G13J8PIlCXVqY8CWRGQT7MAew6cfxVF7HAbYkRRuE99XaUn470aNWdcrb2aRv2N4eXtU4PA7ftttqsTF9=s751\" alt=\"\" \/><\/figure>\n\n\n\n<p>Metasploit shikata-ga-nai encoder that also starts with fpu:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg9dPEQoPYZA8vhWqo78aMVBl53OleDanNFwkJAqy1OhcLJ0uUQAx8lXCp3IeofOhd3p9G2RWzyloVZllqFxjci0fkWbkd5lytYd-_hZGYHzkSf0ShagRjF8DUKFNoTgXnh2fWA1D8gsEoIIOq7QlFNRpgtKtCAtRQtFqANoQRW2xIpebGVMobMbUKr=s542\" alt=\"\" \/><\/figure>\n\n\n\n<p>Displaying PEB structure:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>=&gt;dt<br>structure=&gt;peb<br>address=&gt;0x7ffdf000<br>PEB {<br>reserved1: [<br>0x0,<br>0x0,<br>],<br>being_debugged: 0x0,<br>reserved2: 0x0,<br>reserved3: [<br>0xffffffff,<br>0x400000,<br>],<br>ldr: 0x77647880,<br>process_parameters: 0x2c1118,<br>reserved4: [<br>0x0,<br>0x2c0000,<br>0x77647380,<br>],<br>alt_thunk_list_ptr: 0x0,<br>reserved5: 0x0,<br>reserved6: 0x6,<br>reserved7: 0x773cd568,<br>reserved8: 0x0,<br>alt_thunk_list_ptr_32: 0x0,<br>reserved9: [<br>0x0,<br>\u2026<\/strong><\/p>\n\n\n\n<p>Displaying PEB_LDR_DATA structure:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>=&gt;dt<br>structure=&gt;PEB_LDR_DATA<br>address=&gt;0x77647880<br>PebLdrData {<br>length: 0x30,<br>initializated: 0x1,<br>sshandle: 0x0,<br>in_load_order_module_list: ListEntry {<br>flink: 0x2c18b8,<br>blink: 0x2cff48,<br>},<br>in_memory_order_module_list: ListEntry {<br>flink: 0x2c18c0,<br>blink: 0x2cff50,<br>},<br>in_initialization_order_module_list: ListEntry {<br>flink: 0x2c1958,<br>blink: 0x2d00d0,<br>},<br>entry_in_progress: ListEntry {<br>flink: 0x0,<br>blink: 0x0,<br>},<br>}<br>=&gt;<\/strong><\/p>\n\n\n\n<p>Displaying LDR_DATA_TABLE_ENTRY and first module name<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>=&gt;dt<br>structure=&gt;LDR_DATA_TABLE_ENTRY<br>address=&gt;0x2c18c0<br>LdrDataTableEntry {<br>reserved1: [<br>0x2c1950,<br>0x77647894,<br>],<br>in_memory_order_module_links: ListEntry {<br>flink: 0x0,<br>blink: 0x0,<br>},<br>reserved2: [<br>0x0,<br>0x400000,<br>],<br>dll_base: 0x4014e0,<br>entry_point: 0x1d000,<br>reserved3: 0x40003e,<br>full_dll_name: 0x2c1716,<br>reserved4: [<br>0x0,<br>0x0,<br>0x0,<br>0x0,<br>0x0,<br>0x0,<br>0x0,<br>0x0,<br>],<br>reserved5: [<br>0x17440012,<br>0x4000002c,<br>0xffff0000,<br>],<br>checksum: 0x1d6cffff,<br>reserved6: 0xa640002c,<br>time_date_stamp: 0xcdf27764,<br>}<br>=&gt;<\/strong><\/p>\n\n\n\n<p>A malware is hiding something in an exception<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>3307726 0x4f9673: push ebp<br>3307727 0x4f9674: push edx<br>3307728 0x4f9675: push eax<br>3307729 0x4f9676: push ecx<br>3307730 0x4f9677: push ecx<br>3307731 0x4f9678: push 4F96F4h<br>3307732 0x4f967d: push dword ptr fs:[0]<br>Reading SEH 0x0<br>3307733 0x4f9684: mov eax,[51068Ch]<br>&#8212; console &#8212;<br>=&gt;<\/strong><\/p>\n\n\n\n<p>Let&#8217;s inspect exception structures:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>&#8212; console &#8212;<br>=&gt;r esp<br>esp: 0x22de98<br>=&gt;dt<br>structure=&gt;cppeh_record<br>address=&gt;0x22de98<br>CppEhRecord {<br>old_esp: 0x0,<br>exc_ptr: 0x4f96f4,<br>next: 0xfffffffe,<br>exception_handler: 0xfffffffe,<br>scope_table: PScopeTableEntry {<br>enclosing_level: 0x278,<br>filter_func: 0x51068c,<br>handler_func: 0x288,<br>},<br>try_level: 0x288,<br>}<br>=&gt;<\/strong><\/p>\n\n\n\n<p>And here we have the error routine 0x4f96f4 and the filter 0x51068c<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/sha0coder\/scemu\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Scemu is a x86 32bits emulator, for securely emulating shellcodes Features &nbsp;rust safety, good for malware. All dependencies are in rust. zero unsafe{} blocks. &nbsp;very fast emulation (much faster than unicorn) 3,000,000 instructions\/second 100,000 instructions\/second printing every instruction -vv. powered by iced-x86 rust disassembler awesome library. iteration detector. memory and register tracking. colorized. stop at [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":22394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1037,4781,4783,4782],"class_list":["post-22368","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-emulator","tag-scemu","tag-shellcodes","tag-x86-32bits"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes<\/title>\n<meta name=\"description\" content=\"Scemu is a x86 32bits emulator, for securely emulating shellcodes. \u00a0Rust safety, good for malware. All dependencies are in rust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/scemu\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes\" \/>\n<meta property=\"og:description\" content=\"Scemu is a x86 32bits emulator, for securely emulating shellcodes. \u00a0Rust safety, good for malware. All dependencies are in rust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/scemu\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-04T10:44:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-04T10:44:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/scemu\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scemu\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes\",\"datePublished\":\"2022-03-04T10:44:48+00:00\",\"dateModified\":\"2022-03-04T10:44:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scemu\/\"},\"wordCount\":910,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scemu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728\",\"keywords\":[\"Emulator\",\"Scemu\",\"Shellcodes\",\"X86 32bits\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/scemu\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/scemu\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/scemu\/\",\"name\":\"Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scemu\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scemu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728\",\"datePublished\":\"2022-03-04T10:44:48+00:00\",\"dateModified\":\"2022-03-04T10:44:51+00:00\",\"description\":\"Scemu is a x86 32bits emulator, for securely emulating shellcodes. \u00a0Rust safety, good for malware. All dependencies are in rust.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/scemu\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/scemu\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes","description":"Scemu is a x86 32bits emulator, for securely emulating shellcodes. \u00a0Rust safety, good for malware. All dependencies are in rust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/scemu\/","og_locale":"en_US","og_type":"article","og_title":"Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes","og_description":"Scemu is a x86 32bits emulator, for securely emulating shellcodes. \u00a0Rust safety, good for malware. All dependencies are in rust.","og_url":"https:\/\/kalilinuxtutorials.com\/scemu\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-03-04T10:44:48+00:00","article_modified_time":"2022-03-04T10:44:51+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/scemu\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/scemu\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes","datePublished":"2022-03-04T10:44:48+00:00","dateModified":"2022-03-04T10:44:51+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/scemu\/"},"wordCount":910,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/scemu\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728","keywords":["Emulator","Scemu","Shellcodes","X86 32bits"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/scemu\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/scemu\/","url":"https:\/\/kalilinuxtutorials.com\/scemu\/","name":"Scemu : X86 32bits Emulator, For Securely Emulating Shellcodes","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/scemu\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/scemu\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728","datePublished":"2022-03-04T10:44:48+00:00","dateModified":"2022-03-04T10:44:51+00:00","description":"Scemu is a x86 32bits emulator, for securely emulating shellcodes. \u00a0Rust safety, good for malware. All dependencies are in rust.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/scemu\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/scemu\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg-5VCUWDPnHOie-CN4E-DWQG6ZI1zfoPrwyg-nW4LkSlNCLUO6ancxh34T28X99UwyLq8MBZPmeso5UgPi81YE9zNIh1xQbJ3XsHyc1ZcAO-DQPHO2rIIDlRuuymA6jOUhK_tDLD3_YWR3EmIS8JDUeu5qVw2nP_KL2PcEe3titfH5NdSvA95h-ffm=s728","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":8895,"url":"https:\/\/kalilinuxtutorials.com\/qiling\/","url_meta":{"origin":22368,"position":0},"title":"Qiling : Advanced Binary Emulation Framework","author":"R K","date":"February 9, 2020","format":false,"excerpt":"Qiling is an advanced binary emulation framework, with the following features: Cross platform: Windows, MacOS, Linux, BSDCross architecture: X86, X86_64, Arm, Arm64, MipsMultiple file formats: PE, MachO, ELFEmulate & sandbox machine code in a isolated environmentProvide high level API to setup & configure the sandboxFine-grain instrumentation: allow hooks at various\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/p17ONUbCnUU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":24794,"url":"https:\/\/kalilinuxtutorials.com\/maat\/","url_meta":{"origin":22368,"position":1},"title":"Maat : Open-source Symbolic Execution Framework","author":"R K","date":"May 28, 2022","format":false,"excerpt":"Maat is an open-source Dynamic Symbolic Execution and Binary Analysis framework. It provides various functionalities such as symbolic execution, taint analysis, constraint solving, binary loading, environment simulation, and leverages Ghidra's sleigh library for assembly lifting:\u00a0https:\/\/maat.re Key Features Fast & Portable: Designed to scale to real-world applications. Fully written in C++\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHuuKsX7VNZe2suL6QjpFftnd5_yfcJ-OZe0O0FYz0yUD9YuZ3SM61rHjBukPHRRwiJv54wVBnVHe8VZR8q2pTDY7Wk_smeP1p_g_aBw9cYK1SSvZtiimYarRkiODnBOUUqqkdTc343Sndb6wIXOtJCwYB85QoMhwH5e26UhReVzFtpox53Lbts3YN\/s728\/maat_logo%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHuuKsX7VNZe2suL6QjpFftnd5_yfcJ-OZe0O0FYz0yUD9YuZ3SM61rHjBukPHRRwiJv54wVBnVHe8VZR8q2pTDY7Wk_smeP1p_g_aBw9cYK1SSvZtiimYarRkiODnBOUUqqkdTc343Sndb6wIXOtJCwYB85QoMhwH5e26UhReVzFtpox53Lbts3YN\/s728\/maat_logo%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHuuKsX7VNZe2suL6QjpFftnd5_yfcJ-OZe0O0FYz0yUD9YuZ3SM61rHjBukPHRRwiJv54wVBnVHe8VZR8q2pTDY7Wk_smeP1p_g_aBw9cYK1SSvZtiimYarRkiODnBOUUqqkdTc343Sndb6wIXOtJCwYB85QoMhwH5e26UhReVzFtpox53Lbts3YN\/s728\/maat_logo%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHuuKsX7VNZe2suL6QjpFftnd5_yfcJ-OZe0O0FYz0yUD9YuZ3SM61rHjBukPHRRwiJv54wVBnVHe8VZR8q2pTDY7Wk_smeP1p_g_aBw9cYK1SSvZtiimYarRkiODnBOUUqqkdTc343Sndb6wIXOtJCwYB85QoMhwH5e26UhReVzFtpox53Lbts3YN\/s728\/maat_logo%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6729,"url":"https:\/\/kalilinuxtutorials.com\/hrshell-https-http-reverse-shell-built-with-flask\/","url_meta":{"origin":22368,"position":2},"title":"HRShell : HTTPS\/HTTP Reverse Shell Built With Flask","author":"R K","date":"October 1, 2019","format":false,"excerpt":"HRShell is an HTTPS\/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities. It is an HTTPS\/HTTP reverse shell built with flask. It's compatible with python 3.x and has been successfully tested on: Linux ubuntu 18.04 LTS, Kali Linux 2019.3 macOS Mojave Windows\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":17800,"url":"https:\/\/kalilinuxtutorials.com\/speakeasy\/","url_meta":{"origin":22368,"position":3},"title":"Speakeasy : Windows Kernel And User Mode Emulation","author":"R K","date":"September 16, 2021","format":false,"excerpt":"Speakeasy is a portable, modular, binary emulator designed to emulate Windows kernel and user mode malware. Check out the overview in the first\u00a0Speakeasy blog post. Instead of attempting to perform dynamic analysis using an entire virtualized operating system, Speakeasy will emulate specific components of Windows. Specifically, by emulating operating system\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-IwOL8AeecUQ\/YTD3QTYKlmI\/AAAAAAAAKpg\/ZyIJAK43im4uX1TFGMD7YK58BteZIcjtwCLcBGAsYHQ\/s951\/w%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-IwOL8AeecUQ\/YTD3QTYKlmI\/AAAAAAAAKpg\/ZyIJAK43im4uX1TFGMD7YK58BteZIcjtwCLcBGAsYHQ\/s951\/w%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-IwOL8AeecUQ\/YTD3QTYKlmI\/AAAAAAAAKpg\/ZyIJAK43im4uX1TFGMD7YK58BteZIcjtwCLcBGAsYHQ\/s951\/w%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-IwOL8AeecUQ\/YTD3QTYKlmI\/AAAAAAAAKpg\/ZyIJAK43im4uX1TFGMD7YK58BteZIcjtwCLcBGAsYHQ\/s951\/w%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":4096,"url":"https:\/\/kalilinuxtutorials.com\/phantom-evasion\/","url_meta":{"origin":22368,"position":4},"title":"Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable Even With The Most Common 32 bit Metasploit Payload","author":"R K","date":"March 8, 2019","format":false,"excerpt":"Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most common 32 bit msfvenom payload (lower detection ratio with 64 bit payloads). The aim of this tool is to make antivirus evasion an easy task for pentesters through the use\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":23280,"url":"https:\/\/kalilinuxtutorials.com\/shellcodetester\/","url_meta":{"origin":22368,"position":5},"title":"Shellcodetester : An Application To Test Windows And Linux Shellcodes","author":"R K","date":"March 25, 2022","format":false,"excerpt":"Shellcodetester is a tool that tests generated ShellCodes. Usage Example ShellCode Tester Linux Installation git clone https:\/\/github.com\/helviojunior\/shellcodetester.git cd shellcodetester\/Linux make Usage Without break-point: shellcodetester [file.asm] With break-point (INT3). The break-point will be inserted before our generated shellcode: shellcodetester [file.asm] --break-point Download","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjq_LZxj_s0zOSby5OQaIeseFzHp9CslGYwmF1_V_7B7Ku_nHKIbZP5TH9SorvDjYDqa8-u4YkEMe7dgNyTVVUozDYXyANecY1Ku_6vOP_lSkFxJqjfUWStJZgAsurT4EIGF7PmyojkdACae5Fc73hOrIEC1F4bKrYiHmD1JKCKLzYHlasgW51XY53p\/s728\/images.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjq_LZxj_s0zOSby5OQaIeseFzHp9CslGYwmF1_V_7B7Ku_nHKIbZP5TH9SorvDjYDqa8-u4YkEMe7dgNyTVVUozDYXyANecY1Ku_6vOP_lSkFxJqjfUWStJZgAsurT4EIGF7PmyojkdACae5Fc73hOrIEC1F4bKrYiHmD1JKCKLzYHlasgW51XY53p\/s728\/images.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjq_LZxj_s0zOSby5OQaIeseFzHp9CslGYwmF1_V_7B7Ku_nHKIbZP5TH9SorvDjYDqa8-u4YkEMe7dgNyTVVUozDYXyANecY1Ku_6vOP_lSkFxJqjfUWStJZgAsurT4EIGF7PmyojkdACae5Fc73hOrIEC1F4bKrYiHmD1JKCKLzYHlasgW51XY53p\/s728\/images.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjq_LZxj_s0zOSby5OQaIeseFzHp9CslGYwmF1_V_7B7Ku_nHKIbZP5TH9SorvDjYDqa8-u4YkEMe7dgNyTVVUozDYXyANecY1Ku_6vOP_lSkFxJqjfUWStJZgAsurT4EIGF7PmyojkdACae5Fc73hOrIEC1F4bKrYiHmD1JKCKLzYHlasgW51XY53p\/s728\/images.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=22368"}],"version-history":[{"count":26,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22368\/revisions"}],"predecessor-version":[{"id":22450,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22368\/revisions\/22450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/22394"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=22368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=22368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=22368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}