SharpObfuscate - Payload obfuscation in C#

SharpObfuscate transforms a payload into a list of IPv4, IPv6, MAC or UUID strings. It takes the bytes from a hexadecimal string, a file in the system, a file downloaded from a URL or an ordinary string.

Repository: https://github.com/ricardojoserf/SharpObfuscate



Usage

SharpObfuscate.exe [OPTION] [PAYLOAD]

There are 4 possible values for the option parameter:

  • “ipv4”: Get the list of strings in IPv4 address format, like “192.100.1.1”
  • “ipv6”: Get the list of strings in IPv6 address format, like “2001:0db8:85a3:0000:0000:8a2e:0370:7334”
  • “mac”: Get the list of strings in MAC address format, like “00-B0-D0-63-C2-26”
  • “uuid”: Get the list of strings in UUID format, like “550e8400-e29b-41d4-a716-446655440000”

The payload parameter can be a:

  • Hexadecimal value - If it starts with “0x” or “\x” we take the bytes from the string.
    • Examples: “0xFC4883”, “\xFC\x48\x83”
  • File path - If it is the path of a file in the system, we take the bytes from it.
    • Example: “C:\Windows\System32\calc.exe”
  • URL to download a file - If it starts with “http” we download the file and take the bytes from it.
    • Example: “http://127.0.0.1/test.txt”
  • String - If no other payload type applies, we take the bytes from the string.

The result is a variable containing the obfuscated strings and the bytes decoded from that list.



Examples

Get IPv4 string list from a hexadecimal value in “0x” format

img1

Get IPv6 string list from a hexadecimal value in “\x” format

img2

Get MAC string list from a file in the system

img3

Get UUID string list from a file downloaded from a URL

img4


Written on February 18, 2024