• Skip to primary navigation
  • Skip to content
  • Skip to footer
Heckhausen.IT
  • CheatSheets
  • Projects
  • ShenCode
  • About

    ShenCode - Wiki

    • Core
      • Home
      • Extract
      • Output
      • Task Engine
    • Encoder
      • AES
      • Alphanum
      • ByteBert
      • ByteSwap
      • xorPoly
      • XOR
    • Inject
      • DLL Injection
      • Injection
      • NtInjection
      • Process Overwrite
    • Obfuscate
      • Feed
      • QR-Code
      • ROLHash
      • UUID
    • Payload
      • MSFVenom
      • WinExec
    • Stager
      • Meterpreter Stager
      • Sliver Stager
    • Archive
      • Display and Analyze binary

    Index

    • Core
    • Encoder
    • Obfuscate
    • Payload
    • Stager

    ShenCode - A versatile tool for working with shellcodes.

    Docs Version 0.8.2

    Core

    • Extract: extract code
    • Output: Inspect and display files in different formats
    • Subproc: Execute a subprocess
    • Task: task engine

    Encoder

    • AES: AES-Encoder
    • Alphanum: Encoder to avoid zero bytes
    • ByteBert: Advanced polymorphic encoder
    • ByteSwap: Polymorphic encoder
    • PolyXOR: Polymorphic XOR encoder
    • XOR-Encoder: Simple XOR encoder

    Inject

    • DLL: Inject a dll into a process
    • Inject: inject a shellcode to a process
    • NtInject: Inject with native functions
    • PSOverwrite: Overwrite a process with shellcode

    Obfuscate

    • Feed: Hide shellcodes as rss.xml
    • QR-Code: Generate QR-Codes from files
    • Rolhash: ROR13 to ROL Encoder
    • UUID: Transform bytes to UUIDs

    Payload

    • MSFVenom: Create Payloads
    • WinExec: Custom WinExec Shellcode

    Stager

    • Meterpreter: reverse_tcp stager
    • Sliver: https stager
    • Feed
    © 2025 Heckhausen.IT. Powered by Jekyll & Minimal Mistakes.