You're Invited:Meet the Socket Team at BlackHat and DEF CON in Las Vegas, Aug 4-6.RSVP
Socket
Book a DemoInstallSign in
Socket

mbinobs

Package Overview
Dependencies
Maintainers
1
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

mbinobs

Mix bin obfuscator

1.2
pipPyPI
Maintainers
1

Mix binary obfuscation tool

Obfuscate -> Binary code into ipv4 / ipv6 / mac / uuid adresses <-

Instalation: pip3 install mbinobs or clone repo and run pip3 install .

Command line usage : python3 -m mbinobs binary.bin ipv4/ipv6/mac/uuid

Exemple :

3m@ss:~/mbin-obs$ echo 'qwertyuiopasdfghjkl123456789' > test.bin

Binary encoded as ipv4:
['113.119.101.114', '116.121.117.105', '111.112.97.115', '100.102.103.104', '106.107.108.49',
'50.51.52.53', '54.55.56.57', '10.0.0.0']

Binary encoded as ipv6:
['7177:6572:7479:7569:6f70:6173:6466:6768', '6a6b:6c31:3233:3435:3637:3839:0a00:0000']

Binary encoded as mac:
['71:77:65:72:74:79', '75:69:6f:70:61:73', '64:66:67:68:6a:6b', '6c:31:32:33:34:35', '36:37:38:39:0a:00']

Binary encoded as uuid:
['71776572-7479-7569-6f70-617364666768', '6a6b6c31-3233-3435-3637-38390a000000']

You can also import the encoding functions:

from mbinobs import *

bfile = open('path_to_file','rb') # Use read bytes option ('rb')

uuid_list = uuid._encode(bfile)
ipv6_list = ipv6._encode(bfile)
ipv4_list = ipv6._encode(bfile)
mac_list = mac._encode(bfile)

You could use RtlIpv6StringToAddressA or RtlIpv4StringToAddressA and similar apis calls to convert those ASCII text to binary code.

Used by Hive ransomware gang to encode shellcode payloads.

Keywords

obfuscation

FAQs

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts