Hey sorry about the broken links and fucked example, this is HOON, an at&t assembler compiler for use on windows/linux to make modular shellcode. this is then second installament of HOON, with calls and jmps pretty much fully working. anyway, there is going to be alot of sub-methods goin into HOON in the next few releases as it shifts to accomodate people trying to exploit stuff. some possibilities are unicode shellcode creation encoding and some other xor/additive encoding/decond schemas. anyway, here's a little demo to suck you in.
C:\HOON>python hoon.py <-- TOKENS --> [INSTRUCTION] [REGISTER] [REGISTER] : xorl %eax,%eax [INSTRUCTION] [REGISTER] [REGISTER] : xorl %esp,%esp [INSTRUCTION] [REGISTER] [REGISTER] : xorl %ebx,%ebx <-- ENDTOKEN --> <-- SHELLCODE --> \x33\xc0\x33\xe4\x33\xdb <-- ENDSHELLCODE --> \x33\xc0\x33\xe4\x33\xdb get it from: http://felinemenace.org/~nd/HOON.zip http://felinemenace.org/~nd/HOON.tar FIX IT PLEASE! - nd -- http://felinemenace.org/~nd _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html