Skip to main content

Mix bin obfuscator

Project description

Mix binary obfuscation tool

Obfuscate -> Binary code into ipv4 / ipv6 / mac / uuid adresses <-

Instalation: pip3 install mbinobs or clone repo and run pip3 install .

Command line usage : python3 -m mbinobs binary.bin ipv4/ipv6/mac/uuid

Exemple :

3m@ss:~/mbin-obs$ echo 'qwertyuiopasdfghjkl123456789' > test.bin

Binary encoded as ipv4:
['113.119.101.114', '116.121.117.105', '111.112.97.115', '100.102.103.104', '106.107.108.49',
'50.51.52.53', '54.55.56.57', '10.0.0.0']

Binary encoded as ipv6:
['7177:6572:7479:7569:6f70:6173:6466:6768', '6a6b:6c31:3233:3435:3637:3839:0a00:0000']

Binary encoded as mac:
['71:77:65:72:74:79', '75:69:6f:70:61:73', '64:66:67:68:6a:6b', '6c:31:32:33:34:35', '36:37:38:39:0a:00']

Binary encoded as uuid:
['71776572-7479-7569-6f70-617364666768', '6a6b6c31-3233-3435-3637-38390a000000']

You can also import the encoding functions:

from mbinobs import *

bfile = open('path_to_file','rb') # Use read bytes option ('rb')

uuid_list = uuid._encode(bfile)
ipv6_list = ipv6._encode(bfile)
ipv4_list = ipv6._encode(bfile)
mac_list = mac._encode(bfile)

You could use RtlIpv6StringToAddressA or RtlIpv4StringToAddressA and similar apis calls to convert those ASCII text to binary code.

Used by Hive ransomware gang to encode shellcode payloads.

Project details


Release history Release notifications | RSS feed

This version

1.2

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mbinobs-1.2.tar.gz (4.0 kB view hashes)

Uploaded Source

Built Distribution

mbinobs-1.2-py3-none-any.whl (5.2 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page