{"id":28923,"date":"2023-04-28T12:48:23","date_gmt":"2023-04-28T12:48:23","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=28923"},"modified":"2023-04-28T12:48:27","modified_gmt":"2023-04-28T12:48:27","slug":"shoggoth","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/shoggoth\/","title":{"rendered":"Shoggoth &#8211; Asmjit Based Polymorphic Encryptor"},"content":{"rendered":"\n<p>Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically.<\/p>\n\n\n\n<p>Shoggoth will generate an output file that stores the payload and its corresponding loader in an obfuscated form. Since the content of the output is position-independent, it can be executed directly as a shellcode. While the payload is executing, it decrypts itself at runtime. In addition to the <a href=\"https:\/\/www.kitploit.com\/search\/label\/Encryption\" target=\"_blank\" rel=\"noreferrer noopener\">encryption<\/a> routine, Shoggoth also adds garbage instructions, that change nothing, between routines.<\/p>\n\n\n\n<p>I started to develop this project to study different dynamic instruction generation approaches, <a href=\"https:\/\/www.kitploit.com\/search\/label\/Assembly\" target=\"_blank\" rel=\"noreferrer noopener\">assembly<\/a> practices, and signature detections. I am planning to regularly update the repository with my new learnings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Features<\/h2>\n\n\n\n<p>Current features are listed below:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Works on only x64 inputs<\/li>\n\n\n\n<li>Ability to merge PIC COFF Loader with COFF or BOF input files<\/li>\n\n\n\n<li>Ability to merge PIC PE Loader with PE input files<\/li>\n\n\n\n<li>Stream Cipher with RC4 Algorithm<\/li>\n\n\n\n<li>Block Cipher with randomly generated operations<\/li>\n\n\n\n<li>Garbage instruction generation<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Execution Flow<\/h2>\n\n\n\n<p>The general execution flow of Shoggoth for an input file can be seen in the image below. You can observe this flow with the default configurations.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiDyde-nWPyIVm1EahjljOEPmN1MW4uzS0LIfrMLmx8YrvJajNW2KVJplvMw3k3I39c3M3FGeNGDVc8y48v7jjV_ryylchfMirnW9SOUCthztA-LrPhgW0v5v9pcnc8vzbYQCvBCHcYsbFiYYdNhdJCqbgfByGC8UlPCag4eHX_E9HgGj-3py3mNFXX\/s16000\/ShoggothExecutionFlow.png\" alt=\"\" \/><\/figure>\n\n\n\n<p><a href=\"https:\/\/github.com\/frkngksl\/Shoggoth\/blob\/main\/img\/ShoggothExecutionFlow.png\" rel=\"noreferrer noopener\" target=\"_blank\"><\/a><\/p>\n\n\n\n<p>Basically, Shoggoth first merges the precompiled loader shellcode according to the chosen mode (COFF or PE file) and the input file. It then adds multiple garbage instructions it generates to this merged payload. The stub containing the loader, garbage instruction, and payload is encrypted first with RC4 encryption and then with randomly generated block encryption by combining corresponding decryptors. Finally, it adds a garbage instruction to the resulting block.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Machine Code Generation<\/h2>\n\n\n\n<p>While Shoggoth randomly generates instructions for garbage stubs or encryption routines, it uses <a href=\"https:\/\/asmjit.com\/\" rel=\"noreferrer noopener\" target=\"_blank\">AsmJit<\/a> library.<\/p>\n\n\n\n<p>AsmJit is a lightweight library for machine code generation written in C++ language. It can generate machine code for X86, X86_64, and AArch64 architectures and supports baseline instructions and all recent extensions. AsmJit allows specifying operation codes, registers, immediate operands, call labels, and embedding arbitrary values to any offset inside the code. While generating some assembly instructions by using AsmJit, it is enough to call the API function that corresponds to the required assembly operation with assembly operand values from the <a href=\"https:\/\/www.kitploit.com\/search\/label\/Assembler\" target=\"_blank\" rel=\"noreferrer noopener\">Assembler<\/a> class. For each API call, AsmJit holds code and relocation information in its internal CodeHolder structure. After calling API functions of all assembly commands to be generated, its JitRuntime class can be used to copy the code from CodeHolder into memory with executable permission and relocate it.<\/p>\n\n\n\n<p>While I was searching for a code generation library, I encountered with AsmJit, and I saw that it is widely used by many popular projects. That&#8217;s why I decided to use it for my needs. I don&#8217;t know whether Shoggoth is the first project that uses it in the red team context, but I believe that it can be a reference for future implementations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">COFF and PE Loaders<\/h2>\n\n\n\n<p>Shoggoth can be used to encrypt given PE and COFF files so that both of them can be executed as a shellcode thanks to precompiled position-independent loaders. I simply used the <em>C to Shellcode<\/em> method to obtain the PIC version of well-known PE and COFF loaders I modified for my old projects. For compilation, I used the Makefile from <a href=\"https:\/\/github.com\/codewhitesec\/HandleKatz\" rel=\"noreferrer noopener\" target=\"_blank\">HandleKatz<\/a> project which is an LSASS dumper in PIC form.<\/p>\n\n\n\n<p>Basically, in order to obtain shellcode with the C to Shellcode technique, I removed all the global variables in the loader source code, made all the strings stored in the stack, and resolved the <a href=\"https:\/\/www.kitploit.com\/search\/label\/Windows%20API\" target=\"_blank\" rel=\"noreferrer noopener\">Windows API<\/a> functions&#8217; addresses by loading and parsing the necessary DLLs at runtime. Afterward, I determined the entry point with a linker script and compiled the code by using MinGW with various compilation flags. I extracted the .text section of the generated executable file and obtained the loader shellcode. Since the executable file obtained after editing the code as above does not contain any sections other than the .text section, the code in this section can be used as position-independent.<\/p>\n\n\n\n<p>The source code of these can be seen and edited from <a href=\"https:\/\/github.com\/frkngksl\/Shoggoth\/tree\/main\/COFFLoader\" rel=\"noreferrer noopener\" target=\"_blank\">COFFLoader<\/a> and <a href=\"https:\/\/github.com\/frkngksl\/Shoggoth\/tree\/main\/PELoader\" rel=\"noreferrer noopener\" target=\"_blank\">PELoader<\/a> directories. Also compiled versions of these source codes can be found in <a href=\"https:\/\/github.com\/frkngksl\/Shoggoth\/tree\/main\/stub\" rel=\"noreferrer noopener\" target=\"_blank\">stub<\/a> directory. For now, If you want to edit or change these loaders, you should obey the signatures and replace the precompiled binaries from the stub directory.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">RC4 Cipher<\/h2>\n\n\n\n<p>Shoggoth first uses one of the stream ciphers, the RC4 algorithm, to encrypt the payload it gets. After randomly generating the key used here, it encrypts the payload with that key. The <a href=\"https:\/\/www.kitploit.com\/search\/label\/Decryptor\" target=\"_blank\" rel=\"noreferrer noopener\">decryptor<\/a> stub, which decrypts the payload during runtime, is dynamically created and assembled by using AsmJit. The registers used in the stub are randomly selected for each sample.<\/p>\n\n\n\n<p>I referenced Nayuki&#8217;s <a href=\"https:\/\/www.nayuki.io\/page\/rc4-cipher-in-x86-assembly\" rel=\"noreferrer noopener\" target=\"_blank\">code<\/a> for the implementation of the RC4 algorithm I used in Shoggoth.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Random Block Cipher<\/h2>\n\n\n\n<p>After the first encryption is performed, Shoggoth uses the second encryption which is a randomly generated block cipher. With the second encryption, it encrypts both the RC4 decryptor and optionally the stub that contains the payload, garbage instructions, and loader encrypted with RC4. It divides the chunk to be encrypted into 8-byte blocks and uses randomly generated instructions for each block. These instructions include ADD, SUB, XOR, NOT, NEG, INC, DEC, ROL, and ROR. Operands for these instructions are also selected randomly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Garbage Instruction Generation<\/h2>\n\n\n\n<p>Generated garbage instruction logic is heavily inspired by Ege Balci&#8217;s amazing <a href=\"https:\/\/github.com\/EgeBalci\/sgn\" rel=\"noreferrer noopener\" target=\"_blank\">SGN<\/a> project. Shoggoth can select garbage instructions based on jumping over random bytes, instructions with no side effects, fake function calls, and instructions that have side effects but retain initial values. All these instructions are selected randomly, and generated by calling the corresponding API functions of the AsmJit library. Also, in order to increase both size and different combinations, these generation functions are called recursively.<\/p>\n\n\n\n<p>There are lots of places where garbage instructions can be put in the first version of Shoggoth. For example, we can put garbage instructions between block cipher instructions or RC4 cipher instructions. However, for demonstration purposes, I left them for the following versions to avoid the extra complexity of generated payloads.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Usage<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Requirements<\/strong><\/h3>\n\n\n\n<p>I didn&#8217;t compile the main project. That&#8217;s why you have to compile yourself. Optionally, if you want to edit the source code of the PE loader or COFF loader, you should have MinGW on your machine to compile them by using the given Makefiles.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Visual Studio 2019+<\/li>\n\n\n\n<li>(Optional) MinGW Compiler<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Command Line Parameters<\/h2>\n\n\n\n<pre class=\"wp-block-code has-background\" style=\"background-color:#f4f4f4\"><code> <strong>______ _                                  _\n \/ _____) |                             _  | |\n( (____ | |__   ___   ____  ____  ___ _| |_| |__\n \\____ \\|  _ \\ \/ _ \\ \/ _  |\/ _  |\/ _ (_   _)  _ \\\n _____) ) | | | |_| ( (_| ( (_| | |_| || |_| | | |\n(______\/|_| |_|\\___\/ \\___ |\\___ |\\___\/  \\__)_| |_|\n                    (_____(_____|\n\n                     by @R0h1rr1m\n\n                \"Tekeli-li! Tekeli-li!\"\n\nUsage of Shoggoth.exe:\n\n    -h | --help                             Show the help message.\n    -v | --verbose                          Enable more verbose output.\n    -i | --input &lt;Input Path&gt;               Input path of payload to be encrypted. (Mandatory)\n    -o | --output &lt;Output Path&gt;             Output path for encrypted input. (Mandatory)\n    -s | --seed &lt;Value&gt;                     Set seed value for randomization.\n    -m | --mode &lt;Mode Value&gt;                Set payload encryption mode. Available mods are: (Mandatory)\n                                                &#091;*] raw - Shoggoth doesn't append a loader stub. (Default mode)\n                                                &#091;*] pe - Shoggoth appends a PE loader stub. The input should be valid x64 PE.\n                                                &#091;*] coff - Shoggoth appends a COFF loader stub. The input should be valid x64 COFF.\n    --coff-arg &lt;Argument&gt;                   Set argument for COFF loader. Only used in COFF loader mode.\n    -k | --key &lt;Encryption Key&gt;             Set first encryption key instead of random key.\n    --dont-do-first-encryption              Don't do the first (stream cipher) encryption.\n    --dont-do-second-encryption             Don't do the second (block cipher) encryption.\n    --encrypt-only-decryptor                Encrypt only decryptor stub in the second encryption.<\/strong>\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">What does Shoggoth mean?<\/h2>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjRRAKx2sGSYx8M6za9qya8q9EYGwgHWEfAigPtGfWxA_Row1VO5hUChz-oyzirXX3orpOpHSB_fe0HcDD8rb2mTAIqP25LDfUidrDUWIgaKY2Fp3JmTsAutHmbpGo7HS95VDMa7JPnZdySWCgV_FnyjOmnvoP0LOAerI70VuDY66p5I-Ltf5fFCWUM\/s16000\/shoggoth.jpg\" alt=\"\" width=\"595\" height=\"404\" \/><\/figure>\n\n\n\n<p>&#8220;It was a terrible, indescribable thing vaster than any subway train\u2014a shapeless congeries of protoplasmic bubbles, faintly self-luminous, and with myriads of temporary eyes forming and un-forming as pustules of greenish light all over the tunnel-filling front that bore down upon us, crushing the frantic penguins and slithering over the glistening floor that it and its kind had swept so evilly free of all litter.&#8221; ~\u2009H. P. Lovecraft, At the Mountains of Madness&#8221;<\/p>\n\n\n\n<p>A Shoggoth is a fictional monster in the Cthulhu Mythos. The beings were mentioned in passing in H. P. Lovecraft&#8217;s sonnet cycle Fungi from Yuggoth (1929\u201330) and later described in detail in his novella At the Mountains of Madness (1931). They are capable of forming whatever organs or appendages they require for the task at hand, although their usual state is a writhing mass of eyes, mouths, and wriggling tentacles.<\/p>\n\n\n\n<p>Since these creatures are like a sentient blob of self-shaping, gelatinous flesh and have no fixed shape in Lovecraft&#8217;s descriptions, I want to give that name to a Polymorphic Encryptor tool. ????<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/frkngksl\/Shoggoth#references\"><\/a><\/h1>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>References<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/github.com\/EgeBalci\/sgn\">https:\/\/github.com\/EgeBalci\/sgn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/asmjit\/asmjit\">https:\/\/github.com\/asmjit\/asmjit<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.pelock.com\/articles\/polymorphic-encryption-algorithms\">https:\/\/www.pelock.com\/articles\/polymorphic-encryption-algorithms<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/codewhitesec\/HandleKatz\">https:\/\/github.com\/codewhitesec\/HandleKatz<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/github.com\/vxunderground\/MalwareSourceCode\">https:\/\/github.com\/vxunderground\/MalwareSourceCode<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.nayuki.io\/page\/rc4-cipher-in-x86-assembly\">https:\/\/www.nayuki.io\/page\/rc4-cipher-in-x86-assembly<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.deviantart.com\/halycon450\/art\/Shoggoth-914584713\">https:\/\/www.deviantart.com\/halycon450\/art\/Shoggoth-914584713<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.artstation.com\/burakkrtak\">https:\/\/www.artstation.com\/burakkrtak<\/a> (Logo Designer)<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/github.com\/frkngksl\/Shoggoth\" target=\"_blank\" rel=\"noreferrer noopener\">Click Here To Download<\/a><\/div>\n<\/div>\n\n\n\n<p class=\"has-text-align-center has-background\" style=\"background-color:#f4f4f4\"><strong>Please consider&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/kali-linux-tutorials\/\" target=\"_blank\" rel=\"noreferrer noopener\">following and supporting<\/a>&nbsp;us to stay updated with the latest info<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically. Shoggoth will generate an output file that stores the payload and its corresponding loader in an obfuscated form. Since the content of the output is position-independent, it can be executed directly as a shellcode. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28938,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[6022,513,6021,6020],"class_list":["post-28923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-asmjit-library","tag-c-2","tag-polymorphic-encryptor","tag-shoggoth"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shoggoth - Asmjit Based Polymorphic Encryptor<\/title>\n<meta name=\"description\" content=\"Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/shoggoth\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shoggoth - Asmjit Based Polymorphic Encryptor\" \/>\n<meta property=\"og:description\" content=\"Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/shoggoth\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-28T12:48:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-28T12:48:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Shoggoth &#8211; Asmjit Based Polymorphic Encryptor\",\"datePublished\":\"2023-04-28T12:48:23+00:00\",\"dateModified\":\"2023-04-28T12:48:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/\"},\"wordCount\":1311,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png\",\"keywords\":[\"asmjit library\",\"C++\",\"Polymorphic Encryptor\",\"Shoggoth\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/shoggoth\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/\",\"name\":\"Shoggoth - Asmjit Based Polymorphic Encryptor\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png\",\"datePublished\":\"2023-04-28T12:48:23+00:00\",\"dateModified\":\"2023-04-28T12:48:27+00:00\",\"description\":\"Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/shoggoth\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shoggoth\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shoggoth - Asmjit Based Polymorphic Encryptor","description":"Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/shoggoth\/","og_locale":"en_US","og_type":"article","og_title":"Shoggoth - Asmjit Based Polymorphic Encryptor","og_description":"Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically.","og_url":"https:\/\/kalilinuxtutorials.com\/shoggoth\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-04-28T12:48:23+00:00","article_modified_time":"2023-04-28T12:48:27+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/shoggoth\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/shoggoth\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Shoggoth &#8211; Asmjit Based Polymorphic Encryptor","datePublished":"2023-04-28T12:48:23+00:00","dateModified":"2023-04-28T12:48:27+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/shoggoth\/"},"wordCount":1311,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/shoggoth\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png","keywords":["asmjit library","C++","Polymorphic Encryptor","Shoggoth"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/shoggoth\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/shoggoth\/","url":"https:\/\/kalilinuxtutorials.com\/shoggoth\/","name":"Shoggoth - Asmjit Based Polymorphic Encryptor","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/shoggoth\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/shoggoth\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png","datePublished":"2023-04-28T12:48:23+00:00","dateModified":"2023-04-28T12:48:27+00:00","description":"Shoggoth is an open-source project based on C++ and asmjit library used to encrypt given shellcode, PE, and COFF files polymorphically.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/shoggoth\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/shoggoth\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNbU3WEbhIcgLAGlUfNml8edasQdKFLcKxCpMs1RUN7nmtc6i4vo1B5s4wXmsHmVsQizbb08SfcDyvL2CwzpiThJ42ilbz8S3Ub2dHI-z_zIgIt-XlAJ_SO035l6EtvxlIVwpbHQAo2i2jY20x6ixWGqA0Vxik5tqgJ537kNZzcs_efCyGVv3EPsPg\/s16000\/kali%20temp%20(2).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":22254,"url":"https:\/\/kalilinuxtutorials.com\/shellcode-encryptor\/","url_meta":{"origin":28923,"position":0},"title":"Shellcode-Encryptor : A Simple Shell Code Encryptor\/Decryptor\/Executor To Bypass Anti Virus","author":"R K","date":"March 1, 2022","format":false,"excerpt":"Shellcode-Encryptor is a simple shell code encryptor\/decryptor\/executor to bypass anti virus. Note:\u00a0I have completely redone the work flow for creating the bypass, I have found injecting the binary into memory using PowerShell as the most effective method. Purpose To generate a .Net binary containing base64 encoded, AES encrypted shellcode that\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhsBOnh4DsI0O9JNnFfL1IUk3nvIRc7dqHaWmlRhrE8IpfFJPh9AGs5z0UCQzymizGIc1lZQd8gpPocQryAAt5OAr2q82CvTgCUMdPjYeC5gIe6bIxDmkR7Z8ApjsZ8px-eo7p3Vb4RsP8VqHvHCkwtiqyHoFRJitnO_ryMNT6mBja1QTLBkNG05r1L=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhsBOnh4DsI0O9JNnFfL1IUk3nvIRc7dqHaWmlRhrE8IpfFJPh9AGs5z0UCQzymizGIc1lZQd8gpPocQryAAt5OAr2q82CvTgCUMdPjYeC5gIe6bIxDmkR7Z8ApjsZ8px-eo7p3Vb4RsP8VqHvHCkwtiqyHoFRJitnO_ryMNT6mBja1QTLBkNG05r1L=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhsBOnh4DsI0O9JNnFfL1IUk3nvIRc7dqHaWmlRhrE8IpfFJPh9AGs5z0UCQzymizGIc1lZQd8gpPocQryAAt5OAr2q82CvTgCUMdPjYeC5gIe6bIxDmkR7Z8ApjsZ8px-eo7p3Vb4RsP8VqHvHCkwtiqyHoFRJitnO_ryMNT6mBja1QTLBkNG05r1L=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhsBOnh4DsI0O9JNnFfL1IUk3nvIRc7dqHaWmlRhrE8IpfFJPh9AGs5z0UCQzymizGIc1lZQd8gpPocQryAAt5OAr2q82CvTgCUMdPjYeC5gIe6bIxDmkR7Z8ApjsZ8px-eo7p3Vb4RsP8VqHvHCkwtiqyHoFRJitnO_ryMNT6mBja1QTLBkNG05r1L=s728 2x"},"classes":[]},{"id":4096,"url":"https:\/\/kalilinuxtutorials.com\/phantom-evasion\/","url_meta":{"origin":28923,"position":1},"title":"Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable Even With The Most Common 32 bit Metasploit Payload","author":"R K","date":"March 8, 2019","format":false,"excerpt":"Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most common 32 bit msfvenom payload (lower detection ratio with 64 bit payloads). The aim of this tool is to make antivirus evasion an easy task for pentesters through the use\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10898,"url":"https:\/\/kalilinuxtutorials.com\/sgn\/","url_meta":{"origin":28923,"position":2},"title":"SGN : A Polymorphic Binary Encoder For Offensive Security Purposes","author":"R K","date":"July 9, 2020","format":false,"excerpt":"SGN is a polymorphic binary encoder for offensive security purposes such as generating statically undetecable binary payloads. It uses a additive feedback loop to encode given binary instructions similar to LSFR. This project is the reimplementation of the original Shikata ga nai in golang with many improvements. How? & Why?\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":33423,"url":"https:\/\/kalilinuxtutorials.com\/voidgate\/","url_meta":{"origin":28923,"position":3},"title":"Voidgate &#8211; Advanced Technique To Bypass AV\/EDR Memory Scanners","author":"Varshini","date":"June 21, 2024","format":false,"excerpt":"A technique that can be used to\u00a0bypass AV\/EDR memory scanners. This can be used to hide well-known and detected shellcodes (such as msfvenom) by performing\u00a0on-the-fly decryption of individual encrypted assembly instructions, thus rendering memory scanners useless for that specific memory page. How It Works: This technique will create a\u00a0PAGE_EXECUTE_READWRITE\u00a0memory region\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHHAyH0KqSI1qfuSSIb5cLzRoyClAkeihzK5-drkrwY6OOx3GBNs9fPtyXv1iL12CW54NgWeklrJf7e9jPpTJhdTzYJ2syiFZvmt8Vq9qmpC5YXUNAJXRS0dZT5iYB8CgkU3IHvoxr807422CuTnPe766rNXbhpZOggwDVSxYEiEXb0i-YOL_KBDtcjk42\/s16000\/Volana%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHHAyH0KqSI1qfuSSIb5cLzRoyClAkeihzK5-drkrwY6OOx3GBNs9fPtyXv1iL12CW54NgWeklrJf7e9jPpTJhdTzYJ2syiFZvmt8Vq9qmpC5YXUNAJXRS0dZT5iYB8CgkU3IHvoxr807422CuTnPe766rNXbhpZOggwDVSxYEiEXb0i-YOL_KBDtcjk42\/s16000\/Volana%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHHAyH0KqSI1qfuSSIb5cLzRoyClAkeihzK5-drkrwY6OOx3GBNs9fPtyXv1iL12CW54NgWeklrJf7e9jPpTJhdTzYJ2syiFZvmt8Vq9qmpC5YXUNAJXRS0dZT5iYB8CgkU3IHvoxr807422CuTnPe766rNXbhpZOggwDVSxYEiEXb0i-YOL_KBDtcjk42\/s16000\/Volana%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHHAyH0KqSI1qfuSSIb5cLzRoyClAkeihzK5-drkrwY6OOx3GBNs9fPtyXv1iL12CW54NgWeklrJf7e9jPpTJhdTzYJ2syiFZvmt8Vq9qmpC5YXUNAJXRS0dZT5iYB8CgkU3IHvoxr807422CuTnPe766rNXbhpZOggwDVSxYEiEXb0i-YOL_KBDtcjk42\/s16000\/Volana%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHHAyH0KqSI1qfuSSIb5cLzRoyClAkeihzK5-drkrwY6OOx3GBNs9fPtyXv1iL12CW54NgWeklrJf7e9jPpTJhdTzYJ2syiFZvmt8Vq9qmpC5YXUNAJXRS0dZT5iYB8CgkU3IHvoxr807422CuTnPe766rNXbhpZOggwDVSxYEiEXb0i-YOL_KBDtcjk42\/s16000\/Volana%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjHHAyH0KqSI1qfuSSIb5cLzRoyClAkeihzK5-drkrwY6OOx3GBNs9fPtyXv1iL12CW54NgWeklrJf7e9jPpTJhdTzYJ2syiFZvmt8Vq9qmpC5YXUNAJXRS0dZT5iYB8CgkU3IHvoxr807422CuTnPe766rNXbhpZOggwDVSxYEiEXb0i-YOL_KBDtcjk42\/s16000\/Volana%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":29943,"url":"https:\/\/kalilinuxtutorials.com\/supernova\/","url_meta":{"origin":28923,"position":4},"title":"Supernova : The Ultimate Shellcode Encryption &#038; Conversion Toolkit","author":"Varshini","date":"September 1, 2023","format":false,"excerpt":"Meet Supernova, the new and improved shellcode encryption tool made for today's ethical hackers. Supernova is written in Golang and works with both Windows and Linux. It has a wide range of encryption ciphers, such as ROT, XOR, RC4, and AES. What makes it different? It's not just an encryptor;\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":19760,"url":"https:\/\/kalilinuxtutorials.com\/inceptor\/","url_meta":{"origin":28923,"position":5},"title":"Inceptor : Template-Driven AV\/EDR Evasion Framework","author":"R K","date":"October 29, 2021","format":false,"excerpt":"Inceptor is a modern Penetration testing and Red Teaming often requires to bypass common AV\/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently. Inceptor is a tool which can help to automate great part of\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh2AaO3Wpu7SgBYBbqSLaQEzirbhU-ppbOFMOQipQD6WrxAUKk3n8uxC49u51KLuBNPefgSIkllMb-mtN9TH9TX4YdudAM2RV_mSFkOYI_MHM66J3vhJmVAwGMq76SifXd2n1quqYilV--Qn0a5Uo9DtV2i7Mfqo0V6Gvf8eGlneOykJCBgn1X9bErN=s698","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh2AaO3Wpu7SgBYBbqSLaQEzirbhU-ppbOFMOQipQD6WrxAUKk3n8uxC49u51KLuBNPefgSIkllMb-mtN9TH9TX4YdudAM2RV_mSFkOYI_MHM66J3vhJmVAwGMq76SifXd2n1quqYilV--Qn0a5Uo9DtV2i7Mfqo0V6Gvf8eGlneOykJCBgn1X9bErN=s698 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh2AaO3Wpu7SgBYBbqSLaQEzirbhU-ppbOFMOQipQD6WrxAUKk3n8uxC49u51KLuBNPefgSIkllMb-mtN9TH9TX4YdudAM2RV_mSFkOYI_MHM66J3vhJmVAwGMq76SifXd2n1quqYilV--Qn0a5Uo9DtV2i7Mfqo0V6Gvf8eGlneOykJCBgn1X9bErN=s698 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=28923"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28923\/revisions"}],"predecessor-version":[{"id":28937,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28923\/revisions\/28937"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/28938"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=28923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=28923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=28923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}